Metadata-Version: 2.1
Name: aa-policy-validator
Version: 0.8
Summary: Run AWS Access Analyzer Policy Validation against all your IAM Policies (account-wide)
Home-page: https://github.com/z0ph/aa-policy-validator
Author: Victor GRENU
Author-email: vgrenu@zoph.io
License: MIT
Download-URL: https://github.com/z0ph/aa-policy-validator/archive/refs/tags/0.8.tar.gz
Description: # :white_check_mark: Access Analyzer - Batch Policy Validator
        
        This script will analyze using [AWS Access Analyzer - Policy Validation](https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-reference-policy-checks.html) all your account customer managed IAM policies.
        
        ## Usage
        
        > ProTip :bulb: : Use AWS CloudShell to run this directly on your AWS Account
        
        ### Install
        
                $ python3 -m pip install aa-policy-validator --user
        ### Run
                $ python3 -m aa-policy-validator
        
        ### Update
        
                $ python3 -m pip install aa-policy-validator -U --user --no-cache-dir
        ## Results
        
        Results will be written into `/tmp/findings` folder with a `README.md` file inside.
        
        ![findings screenshot](./assets/screenshot.png)
        
Keywords: AWS,IAM,AccessAnalyzer,PolicyValidation
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Intended Audience :: Developers
Classifier: Topic :: Software Development :: Build Tools
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.4
Classifier: Programming Language :: Python :: 3.5
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Description-Content-Type: text/markdown
