Control: IAM groups, users, and roles should not have any inline policies
Description
Ensure an AWS Identity and Access Management (IAM) user, IAM role or IAM group does not have an inline policy to control access to systems and assets.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_group_user_role_no_inline_policiesSnapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_group_user_role_no_inline_policies --shareSQL
This control uses a named query:
select  arn as resource,  case    when inline_policies is null then 'ok'    else 'alarm'  end status,  'User ' || title || ' has ' || coalesce(jsonb_array_length(inline_policies), 0) || ' inline policies.' as reason  , account_idfrom  aws_iam_userunionselect  arn as resource,  case    when inline_policies is null then 'ok'    else 'alarm'  end status,  'Role ' || title || ' has ' || coalesce(jsonb_array_length(inline_policies), 0) || ' inline policies.' as reason  , account_idfrom  aws_iam_rolewhere  arn not like '%service-role/%'unionselect  arn as resource,  case    when inline_policies is null then 'ok'    else 'alarm'  end status,  'Group ' || title || ' has ' || coalesce(jsonb_array_length(inline_policies), 0) || ' inline policies.' as reason  , account_idfrom  aws_iam_group;