Improved on evaluate-iam-role.sh

This commit is contained in:
mgeeky 2019-12-05 17:58:18 +01:00
parent a98678255a
commit c2a067146a
1 changed files with 28 additions and 18 deletions

View File

@ -47,6 +47,7 @@ IFS=$'\n'
attached_role_policies=($(aws --profile $PROFILE iam list-attached-role-policies --role-name $ROLE_NAME | jq -r '.AttachedPolicies[].PolicyArn'))
dangerous_permissions=()
all_perms=()
for policy in "${attached_role_policies[@]}" ; do
echo -e "\n=============== Attached Policy Arn: $policy ==============="
@ -56,11 +57,10 @@ for policy in "${attached_role_policies[@]}" ; do
policy_version=$(aws --profile $PROFILE iam get-policy-version --policy-arn $policy --version-id $version_id)
echo "$policy_version"
permissions=($(echo "$policy_version" | jq -r '.PolicyVersion.Document.Statement[].Action | if type=="string" then [.] else . end | .[]'))
effect=$(echo "$policy_version" | jq -r '.PolicyVersion.Document.Statement[].Effect' )
permissions=($(echo "$policy_version" | jq -r '.PolicyVersion.Document.Statement[] | select(.Effect=="Allow") | if .Action|type=="string" then [.Action] else .Action end | .[]'))
if [[ "$effect" == "Allow" ]]; then
for perm in "${permissions[@]}" ; do
all_perms+=("$perm")
for dangperm in "${known_dangerous_permissions[@]}"; do
if echo "$dangperm" | grep -iq $perm ; then
dangerous_permissions+=("$perm")
@ -69,7 +69,13 @@ for policy in "${attached_role_policies[@]}" ; do
fi
done
done
fi
done
if [[ ${#all_perms[@]} -gt 0 ]]; then
echo -e "\n\n=============== All permissions granted to this role ==============="
sorted=($(echo "${all_perms[@]}" | tr ' ' '\n' | sort -u ))
for perm in "${sorted[@]}"; do
echo -e "\t$perm"
done
if [[ ${#dangerous_permissions[@]} -gt 0 ]]; then
@ -81,3 +87,7 @@ if [[ ${#dangerous_permissions[@]} -gt 0 ]]; then
else
echo -e "\nNo dangerous permissions were found to be granted."
fi
else
echo -e "\nNo permissions were found to be granted."
fi