Exemplo n.º 1
0
def test_policy_document_with_condition_is_ignored(
        iam_policy_with_wildcard_resource_and_wildcard_action_and_condition):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(
        iam_policy_with_wildcard_resource_and_wildcard_action_and_condition)

    assert result.valid
    assert result.failed_monitored_rules == []
    assert compare_lists_of_failures(
        result.warnings,
        [
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "root" allowing all actions',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"*"},
                resource_ids={"RolePolicy"},
            )
        ],
    )
Exemplo n.º 2
0
def test_policy_document_with_wildcard_resource_and_wilcard_action_without_policy_name_is_detected(
    iam_policy_with_wildcard_resource_and_wilcard_action_without_policy_name,
):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(
        iam_policy_with_wildcard_resource_and_wilcard_action_without_policy_name
    )

    assert result.valid is False
    assert compare_lists_of_failures(
        result.failures,
        [
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource allowing all actions',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"*"},
                resource_ids={"RolePolicy"},
            )
        ],
    )
Exemplo n.º 3
0
def test_user_with_inline_policy_with_wildcard_resource_is_detected(
        user_with_wildcard_resource):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "not_allowed_stack"
    rule.all_cf_actions = set()
    result = rule.invoke(user_with_wildcard_resource)

    assert result.valid is False
    assert compare_lists_of_failures(
        result.failures,
        [
            Failure(
                granularity="ACTION",
                reason=
                '"userWithInline" is using a wildcard resource in "somePolicy" for "s3:DeleteBucket"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"s3:ListBucket", "s3:DeleteBucket"},
                resource_ids={"userWithInline"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"userWithInline" is using a wildcard resource in "somePolicy" for "s3:ListBucket"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"s3:ListBucket", "s3:DeleteBucket"},
                resource_ids={"userWithInline"},
            ),
        ],
    )
Exemplo n.º 4
0
def test_policy_with_invalid_string_policy_document(patched_logger, policy_with_invalid_string_policy_document):
    rule = WildcardResourceRule(None)
    rule.all_cf_actions = set()
    result = rule.invoke(policy_with_invalid_string_policy_document)

    assert result.valid is True
    patched_logger.assert_called_with(
        "Could not process the PolicyDocument FOOBARFOOBAR on GuardDutyResourcePolicy", stack_info=True
    )
Exemplo n.º 5
0
def test_exclude_certain_resources_on_rule(iam_policy_with_wildcard_resource_and_wildcard_action):
    # Any subclass of this rule may want to exclude certain resource types. As a test, let's exclude IAM Policies.
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    rule.EXCLUDED_RESOURCE_TYPES = (IAMPolicy,)
    result = rule.invoke(iam_policy_with_wildcard_resource_and_wildcard_action)

    assert result.valid
    assert compare_lists_of_failures(result.failures, [])
Exemplo n.º 6
0
def test_kms_key_with_wildcard_resource_not_allowed_is_not_flagged(kms_key_with_wildcard_policy):
    # When KMS Key policies use * in the resource, that * will only apply this policy to the KMS Key being created
    # so, we must not flag this
    # Source: https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(kms_key_with_wildcard_policy)

    assert result.valid
    assert compare_lists_of_failures(result.failures, [])
Exemplo n.º 7
0
def test_policy_with_string_policy_document(policy_with_string_policy_document):
    rule = WildcardResourceRule(None)
    rule.all_cf_actions = set()
    result = rule.invoke(policy_with_string_policy_document)

    assert result.valid is False
    assert result.failures == [
        Failure(
            granularity="ACTION",
            reason='"GuardDutyResourcePolicy" is using a wildcard resource for "logs:CreateLogStream"',
            risk_value="MEDIUM",
            rule="WildcardResourceRule",
            rule_mode="BLOCKING",
            actions={"logs:CreateLogStream"},
            resource_ids={"GuardDutyResourcePolicy"},
            resource_types={"AWS::Logs::ResourcePolicy"},
        )
    ]
Exemplo n.º 8
0
def test_policy_s3_wildcard_and_all_buckets(
        policy_with_s3_wildcard_and_all_buckets):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(policy_with_s3_wildcard_and_all_buckets)

    assert result.valid is False
    assert (Failure(
        granularity="ACTION",
        reason=
        '"RolePolicy" is using a wildcard resource in "Policy for something." for "s3:PutObject"',
        risk_value="MEDIUM",
        rule="WildcardResourceRule",
        rule_mode="BLOCKING",
        actions={"s3:*"},
        resource_ids={"RolePolicy"},
    ) in result.failures)
    assert 100 < len(result.failures)
Exemplo n.º 9
0
def test_policy_document_with_condition_is_ignored(iam_policy_with_wildcard_resource_and_wildcard_action_and_condition):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(iam_policy_with_wildcard_resource_and_wildcard_action_and_condition)

    assert result.valid
    assert compare_lists_of_failures(
        result.failures,
        [
            Failure(
                granularity=RuleGranularity.ACTION,
                reason='"RolePolicy" is using a wildcard resource in "root" allowing all actions',
                risk_value=RuleRisk.MEDIUM,
                rule="WildcardResourceRule",
                rule_mode=RuleMode.MONITOR,
                actions={"*"},
                resource_ids={"RolePolicy"},
                resource_types={"AWS::IAM::Policy"},
            )
        ],
    )
Exemplo n.º 10
0
def test_policy_document_with_wildcard_resource_without_policy_name_is_detected(
    iam_policy_with_wildcard_resource_without_policy_name, ):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(iam_policy_with_wildcard_resource_without_policy_name)

    assert result.valid is False
    assert compare_lists_of_failures(
        result.failures,
        [
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:AddPermission"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ChangeMessageVisibility"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ChangeMessageVisibilityBatch"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:CreateQueue"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:DeleteMessage"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:DeleteMessageBatch"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:DeleteQueue"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:GetQueueAttributes"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:GetQueueUrl"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ListDeadLetterSourceQueues"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ListQueueTags"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ListQueues"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:PurgeQueue"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:ReceiveMessage"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:RemovePermission"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:SendMessage"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:SendMessageBatch"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:SetQueueAttributes"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:TagQueue"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource for "sqs:UntagQueue"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"sqs:*"},
                resource_ids={"RolePolicy"},
            ),
        ],
    )
Exemplo n.º 11
0
def test_multiple_resources_with_wildcard_resources_are_detected(
        user_and_policy_with_wildcard_resource):
    rule = WildcardResourceRule(None)
    rule._config.stack_name = "stack3"
    rule.all_cf_actions = set()
    result = rule.invoke(user_and_policy_with_wildcard_resource)

    assert result.valid is False
    assert compare_lists_of_failures(
        result.failures,
        [
            Failure(
                granularity="ACTION",
                reason=
                '"userWithInline" is using a wildcard resource in "somePolicy" for "s3:DeleteBucket"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"s3:ListBucket", "s3:DeleteBucket"},
                resource_ids={"userWithInline"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"userWithInline" is using a wildcard resource in "somePolicy" for "s3:ListBucket"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={"s3:ListBucket", "s3:DeleteBucket"},
                resource_ids={"userWithInline"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:BatchGetItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:BatchWriteItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:CreateTable"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DeleteBackup"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DeleteItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DeleteTable"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DeleteTableReplica"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DescribeStream"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:DescribeTable"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:GetItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:GetRecords"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:GetShardIterator"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:PutItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:Query"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:Scan"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateContinuousBackups"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateContributorInsights"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateGlobalTable"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateGlobalTableSettings"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateItem"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateTable"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateTableReplicaAutoScaling"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
            Failure(
                granularity="ACTION",
                reason=
                '"RolePolicy" is using a wildcard resource in "TheExtremePolicy" for "dynamodb:UpdateTimeToLive"',
                risk_value="MEDIUM",
                rule="WildcardResourceRule",
                rule_mode="BLOCKING",
                actions={
                    "dynamodb:CreateTable",
                    "dynamodb:BatchGet*",
                    "dynamodb:Scan",
                    "dynamodb:Update*",
                    "dynamodb:Query",
                    "dynamodb:Delete*",
                    "dynamodb:PutItem",
                    "dynamodb:DescribeStream",
                    "dynamodb:DescribeTable",
                    "dynamodb:BatchWrite*",
                    "dynamodb:Get*",
                },
                resource_ids={"RolePolicy"},
            ),
        ],
    )