Control: IAM custom policy should not have overly permissive STS role assumption
Description
Ensure that no custom IAM policies exist which allow permissive role assumption.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_policy_custom_no_permissive_role_assumption
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_policy_custom_no_permissive_role_assumption --share
SQL
This control uses a named query:
iam_policy_custom_no_permissive_role_assumption