turbot/aws_compliance
Loading controls...

Control: EC2 instance IAM role should not allow cloud log tampering access

Description

This control ensures that EC2 instance IAM roles do not allow cloud log tampering access.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.ec2_instance_no_iam_role_with_cloud_log_tampering_access

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.ec2_instance_no_iam_role_with_cloud_log_tampering_access --share

SQL

This control uses a named query:

ec2_instance_no_iam_role_with_cloud_log_tampering_access

Tags