This stack will monitor IAM and alert on things CloudCoreo developers think are violations of best practices
This repo is designed to work with CloudCoreo. It will monitor IAM against best practices for you and send a report to the email address designated by the config.yaml AUDIT_AWS_IAM_ALERT_RECIPIENT value
- description: Enter the email address(es) that will receive notifications. If more than one, separate each with a comma.
- description: Which alerts would you like to check for? (Default is all IAM alerts)
- default: iam-unusediamgroup, iam-inactive-key-no-rotation, iam-active-key-no-rotation, iam-passwordreuseprevention, iam-missing-password-policy, iam-expirepasswords, iam-no-mfa, iam-root-no-mfa, iam-root-active-key, iam-root-active-password, iam-user-attached-policies
- description: Would you like to receive empty reports? Options - true / false. Default is false.
- default: false
- description: Send reports always or only when there is a change? Options - always / change. Default is change.
- default: change
- description: List of AWS regions to check. Default is us-east-1,us-west-1,us-west-2.
- default: us-east-1, us-east-2, us-west-1, us-west-2, eu-west-1
- description: Would you like to send a Summary ELB report? Options - notify / nothing. Default is no / nothing.
- default: nothing
- description: notify or nothing
- default: notify
None
None
- Audit
- Best Practices
- Alert
- IAM
- Audit