Control: Ensure a support role has been created to manage incidents with AWS Support
Description
AWS provides a support center that can be used for incident notification and response, as well as technical support and customer services.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.iam_support_role
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.iam_support_role --share
SQL
This control uses a named query:
-- pgFormatter-ignorewith support_role_count as( select 'arn:' || a.partition || ':::' || a.account_id as resource, count(policy_arn), a.account_id, a._ctx from aws_account as a left join aws_iam_role as r on r.account_id = a.account_id left join jsonb_array_elements_text(attached_policy_arns) as policy_arn on true where split_part(policy_arn, '/', 2) = 'AWSSupportAccess' or policy_arn is null group by a.account_id, a.partition, a._ctx)select resource, case when count > 0 then 'ok' else 'alarm' end as status, case when count = 1 then 'AWSSupportAccess policy attached to 1 role.' when count > 1 then 'AWSSupportAccess policy attached to ' || count || ' roles.' else 'AWSSupportAccess policy not attached to any role.' end as reason , account_idfrom support_role_count;