01 Run list-functions command (OSX/Linux/UNIX) to list the name of each Amazon Lambda function available in the selected AWS cloud region:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
aws lambda list-functions
--region us-east-1
--output table
--query 'Functions[*].FunctionName'
02 The command output should return a table with the requested function name(s):
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
---------------------------------
| ListFunctions |
+-------------------------------+
| cc-process-stream-function |
| cc-dynamo-exporter-function |
+-------------------------------+
03 Run get-function command (OSX/Linux/UNIX) using the name of the Amazon Lambda function that you want to examine as the identifier parameter, to describe the Amazon Resource Name (ARN) of the IAM execution role associated with the selected function:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
aws lambda get-function
--region us-east-1
--function-name cc-process-stream-function
--query 'Configuration.Role'
04 The command output should return the execution role ARN. The Amazon Resource Name (ARN) includes the role name, e.g. "cc-lambda-stream-execution-role":
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
"arn:aws:iam::123456789012:role/service-role/cc-lambda-stream-execution-role"
05 Run list-role-policies command (OSX/Linux/UNIX) with custom query filters to describe the names of the inline policies associated the Lambda function execution role:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
aws iam list-role-policies
--role-name cc-lambda-stream-execution-role
--query 'PolicyNames'
06 The command output should return the name of each inline policy associated with the selected IAM role:
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
[
"cc-root-inline-policy",
"cc-custom-inline-policy"
]
If the
list-role-policies command output returns one or more customer-inline policies, as shown in the output example above, the IAM execution role associated with the selected Amazon Lambda function is using inline policies.
07 Repeat steps no. 3 – 6 for each Amazon Lambda function available in the selected AWS cloud region.
08 Change the AWS region by updating the --region command parameter value and repeat steps no. 1 – 9 to perform the Audit process for other AWS regions.