Fixed PR-AWS-CLD-IAM-023: Lambda Function should not publicly exposed via resource policy without a condition
Updated PR-AWS-CLD-IAM-001: Ensure no wildcards are specified in IAM policy with 'Resource' section
Updated PR-AWS-CLD-IAM-013: Ensure that the AWS EC2 instances don't have a risky set of permissions management access to minimize security risks
Updated PR-AWS-CLD-IAM-014: Ensure that the AWS Lambda Function instances provisioned in your AWS account don't have a risky set of write permissions to minimize security risks.
Fixed PR-AWS-CLD-LMD-001: AWS Lambda Environment variables should be encrypted at-rest using CMK
Fixed from PR-AWS-CLD-IAM-001 to PR-AWS-CLD-IAM-024
Fixed/Verified from PR-AWS-CLD-IAM-025 - PR-AWS-CLD-IAM-042
Disabled PR-AWS-CLD-IAM-041 as not relevant.
Verified from PR-AWS-CLD-IAM-043 - PR-AWS-CLD-IAM-050
Fixed PR-AWS-CLD-IAM-023: Lambda Function should not publicly exposed via resource policy without a condition
Updated PR-AWS-CLD-IAM-001: Ensure no wildcards are specified in IAM policy with 'Resource' section
Updated PR-AWS-CLD-IAM-013: Ensure that the AWS EC2 instances don't have a risky set of permissions management access to minimize security risks
Updated PR-AWS-CLD-IAM-014: Ensure that the AWS Lambda Function instances provisioned in your AWS account don't have a risky set of write permissions to minimize security risks.
Fixed PR-AWS-CLD-LMD-001: AWS Lambda Environment variables should be encrypted at-rest using CMK
Fixed from PR-AWS-CLD-IAM-001 to PR-AWS-CLD-IAM-024
Fixed/Verified from PR-AWS-CLD-IAM-025 - PR-AWS-CLD-IAM-042
Disabled PR-AWS-CLD-IAM-041 as not relevant.
Verified from PR-AWS-CLD-IAM-043 - PR-AWS-CLD-IAM-050
Disabled PR-AWS-CLD-IAM-045 as duplicate.