diff --git a/assets/queries/cloudFormation/aws/iam_access_analyzer_not_enabled/test/negative1.yaml b/assets/queries/cloudFormation/aws/iam_access_analyzer_not_enabled/test/negative1.yaml index b01d32d8a42..24047fc3eec 100644 --- a/assets/queries/cloudFormation/aws/iam_access_analyzer_not_enabled/test/negative1.yaml +++ b/assets/queries/cloudFormation/aws/iam_access_analyzer_not_enabled/test/negative1.yaml @@ -1,24 +1,24 @@ -#AWSTemplateFormatVersion: 2010-09-09 -#Resources: -# Analyzer: -# Type: "AWS::AccessAnalyzer::Analyzer" -# Properties: -# AnalyzerName: MyAccountAnalyzer -# Type: ACCOUNT -# Tags: -# - Key: Kind -# Value: Dev -# ArchiveRules: -# Archive findings for a trusted AWS account -# RuleName: ArchiveTrustedAccountAccess -# Filter: -# - Property: "principal.AWS" -# Eq: -# - "123456789012" -# Archive findings for known public S3 buckets -# RuleName: ArchivePublicS3BucketsAccess -# Filter: -# - Property: "resource" -# Contains: -# - "arn:aws:s3:::docs-bucket" -# - "arn:aws:s3:::clients-bucket" +AWSTemplateFormatVersion: 2010-09-09 +Resources: + Analyzer: + Type: "AWS::AccessAnalyzer::Analyzer" + Properties: + AnalyzerName: MyAccountAnalyzer + Type: ACCOUNT + Tags: + - Key: Kind + Value: Dev + ArchiveRules: +Archive findings for a trusted AWS account + RuleName: ArchiveTrustedAccountAccess + Filter: + - Property: "principal.AWS" + Eq: + - "123456789012" +Archive findings for known public S3 buckets + RuleName: ArchivePublicS3BucketsAccess + Filter: + - Property: "resource" + Contains: + - "arn:aws:s3:::docs-bucket" + - "arn:aws:s3:::clients-bucket"