Skip to main content

Amazon Web Services

This Integration is part of the AWS Pack.#

Supported versions

Supported Cortex XSOAR versions: 5.5.0 and later.

Support for AWS cloud This integration was integrated and tested with version 1.0.0 of AWS.

Configure AWS in Cortex#

ParameterDescriptionRequired
Main RoleMain Role to be used for authentication e.g. 'PowerUserAccess'False
Deafult AWS Account IDAWS Account ID used for running integration test
Role Session NameRole session name to be used for authentication
Role Session DurationMax role session durationFalse
Default AWS Access Key IDAWS Access Key ID used for authentication when role-based authentication is not available. Must be used together with 'Default AWS Secret Access Key'. If provided, these credentials will be used as a fallback when role assumption fails.False
Default AWS Secret Access KeyAWS Secret Access Key used for authentication when role-based authentication is not available. Must be used together with 'Default AWS Access Key ID'. If provided, these credentials will be used as a fallback when role assumption fails.False
PasswordFalse
Default AWS region.The AWS region to use for API requests when a region is not explicitly specified in a command. This serves as the default region for operations across all AWS service-specific commands.
TimeoutThe time in seconds till a timeout exception is reached. You can specify just the read timeout (for example 60) or also the connect timeout followed after a comma (for example 60,10). If a connect timeout is not specified, a default of 10 second will be used.False
RetriesThe maximum number of retry attempts when connection or throttling errors are encountered. Set to 0 to disable retries. The default value is 5 and the limit is 10. Note: Increasing the number of retries will increase the execution time.False
PrivateLink service URL.False
STS PrivateLink URL.False
AWS STS Regional EndpointsSets the AWS_STS_REGIONAL_ENDPOINTS environment variable to specify the AWS STS endpoint resolution logic. By default, this option is set to “legacy” in AWS. Leave empty if the environment variable is already set using server configuration.False
Role name for cross-organization account accessThe role name used to access accounts in the organization. This role name must exist in the accounts provided in "AWS Organization accounts" and be assumable with the credentials provided.False
Use system proxy settingsFalse
Trust any certificate (not secure)False

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

aws-s3-public-access-block-update#


Creates or modifies the PublicAccessBlock configuration for an Amazon S3 bucket.

Base Command#

aws-s3-public-access-block-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region.Required
bucketThe name of the Amazon S3 bucket.Required
block_public_aclsSpecifies whether Amazon S3 should block public access control lists (ACLs) for this bucket and objects in this bucket. Possible values are: true, false.Optional
ignore_public_aclsSpecifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this bucket. Possible values are: true, false.Optional
block_public_policySpecifies whether Amazon S3 should block public bucket policies for this bucket. Possible values are: true, false.Optional
restrict_public_bucketsSpecifies whether Amazon S3 should restrict public bucket policies for this bucket. Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

aws-iam-account-password-policy-get#


Get AWS account password policy.

Base Command#

aws-iam-account-password-policy-get

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required

Context Output#

PathTypeDescription
AWS.IAM.PasswordPolicy.MinimumPasswordLengthnumberMinimum length to require for IAM user passwords.
AWS.IAM.PasswordPolicy.RequireSymbolsbooleanSpecifies whether IAM user passwords must contain at least one of the symbols.
AWS.IAM.PasswordPolicy.RequireNumbersbooleanSpecifies whether IAM user passwords must contain at least one numeric character (0 to 9).
AWS.IAM.PasswordPolicy.RequireUppercaseCharactersbooleanSpecifies whether IAM user passwords must contain at least one uppercase character (A to Z).
AWS.IAM.PasswordPolicy.RequireLowercaseCharactersbooleanSpecifies whether IAM user passwords must contain at least one lowercase character (a to z).
AWS.IAM.PasswordPolicy.AllowUsersToChangePasswordbooleanSpecifies whether IAM users are allowed to change their own password.
AWS.IAM.PasswordPolicy.ExpirePasswordsbooleanIndicates whether passwords in the account expire.
AWS.IAM.PasswordPolicy.MaxPasswordAgenumberThe number of days that an IAM user password is valid.
AWS.IAM.PasswordPolicy.PasswordReusePreventionnumberSpecifies the number of previous passwords that IAM users are prevented from reusing.
AWS.IAM.PasswordPolicy.HardExpirybooleanSpecifies whether IAM users are prevented from setting a new password via the Amazon Web Services Management Console after their password has expired.

aws-ec2-instance-metadata-options-modify#


Modify the EC2 instance metadata parameters on a running or stopped instance.

Base Command#

aws-ec2-instance-metadata-options-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region.Required
instance_idThe ID of the instance.Required
http_tokensIndicates whether IMDSv2 is required. Possible values are: optional, required.Optional
http_endpointEnables or disables the HTTP metadata endpoint on your instances. Possible values are: disabled, enabled.Optional

Context Output#

There is no context output for this command.

aws-iam-account-password-policy-update#


Create/update password policy.

Base Command#

aws-iam-account-password-policy-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
minimum_password_lengthThe minimum number of characters allowed in an IAM user password. Possible values are: .Optional
require_symbolsSpecifies whether IAM user passwords must contain at least one of the non-alphanumeric characters. Can be "True" or "False". Possible values are: true, false.Optional
require_numbersSpecifies whether IAM user passwords must contain at least one numeric character (0 to 9). Can be "True" or "False". Possible values are: true, false.Optional
require_uppercase_charactersSpecifies whether IAM user passwords must contain at least one uppercase character from the ISO basic Latin alphabet (A to Z). Can be "True" or "False". Possible values are: true, false.Optional
require_lowercase_charactersSpecifies whether IAM user passwords must contain at least one lowercase character from the ISO basic Latin alphabet (a to z). Can be "True" or "False". Possible values are: true, false.Optional
allow_users_to_change_passwordAllows all IAM users in your account to use the AWS Management Console to change their own passwords. Can be "True" or "False". Possible values are: true, false.Optional
max_password_ageThe number of days that an IAM user password is valid. Possible values are: .Optional
password_reuse_preventionSpecifies the number of previous passwords that IAM users are prevented from reusing. Possible values are: .Optional
hard_expiryPrevents IAM users from setting a new password after their password has expired. Can be "True" or "False". Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

aws-ec2-security-group-ingress-revoke#


Revokes one or more ingress rules in a security group.

Base Command#

aws-ec2-security-group-ingress-revoke

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
group_idThe ID of the security group.Required
protocolThe IP protocol: tcp, udp, icmp, or icmpv6. Use -1 to specify all protocols. When used with port and cidr arguments for simple rule revocation.Optional
portFor TCP or UDP: The range of ports to revoke (e.g., "80" or "80-443"). For ICMP: A single integer or range (type-code) representing the ICMP type and code. Use with protocol and cidr for simple rule revocation.Optional
cidrThe IPv4 address range in CIDR format (e.g., "0.0.0.0/0"). Use with protocol and port for simple rule revocation.Optional
ip_permissionsThe sets of IP permissions to revoke, in JSON format. Use this for complex rule configurations or when revoking multiple rules. Cannot be used together with protocol/port/cidr arguments.Optional

Context Output#

There is no context output for this command.

aws-iam-role-from-instance-profile-remove#


Removes the specified IAM role from the specified EC2 instance profile.

Base Command#

aws-iam-role-from-instance-profile-remove

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
instance_profile_nameThe name of the instance profile to update.Required
role_nameThe name of the role to remove.Required

Context Output#

There is no context output for this command.

aws-eks-cluster-config-update#


Updates an Amazon EKS cluster configuration. Only a single type of update can (logging / resources_vpc_config) is allowed per call.

Base Command#

aws-eks-cluster-config-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
cluster_nameThe name of the Amazon EKS cluster to update.Required
loggingEnable or disable exporting the Kubernetes control plane logs for your cluster to CloudWatch Logs . By default, cluster control plane logs aren’t exported to CloudWatch Logs . e.g. "{'clusterLogging': [{'types': ['api', 'audit', 'authenticator', 'controllerManager', 'scheduler'], 'enabled': true}]}".Optional
resources_vpc_configA JSON representation of the VPC configuration used by the cluster control plane. e.g. "{'subnetIds': ['string'], 'securityGroupIds': ['string'], 'endpointPublicAccess': True, 'endpointPrivateAccess': True, 'publicAccessCidrs': ['string']}".Optional

Context Output#

There is no context output for this command.

aws-rds-db-instance-modify#


Modifies an Amazon RDS DB instance. Allows to change various settings of an existing DB instance, such as instance class, storage capacity, security groups, and other configuration parameters.

Base Command#

aws-rds-db-instance-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
db_instance_identifierThe identifier of DB instance to modify. This value is stored as a lowercase string.Required
publicly_accessibleSpecifies whether the DB instance is publicly accessible. Possible values are: true, false.Optional
apply_immediatelySpecifies whether the modifications in this request and any pending modifications are asynchronously applied as soon as possible, regardless of the PreferredMaintenanceWindow setting for the DB instance. By default, this parameter is disabled. If this parameter is disabled, changes to the DB instance are applied during the next maintenance window. Some parameter changes can cause an outage and are applied on the next call to RebootDBInstance , or the next failure reboot. Possible values are: true, false.Optional
copy_tags_to_snapshotSpecifies whether to copy all tags from the DB instance to snapshots of the DB instance. By default, tags aren’t copied. Possible values are: true, false.Optional
backup_retention_periodThe number of days to retain automated backups. Setting this parameter to a positive number enables backups. Setting this parameter to 0 disables automated backups.Optional
enable_iam_database_authenticationSpecifies whether to enable mapping of Amazon Web Services Identity and Access Management (IAM) accounts to database accounts. By default, mapping isn’t enabled. Possible values are: true, false.Optional
deletion_protectionSpecifies whether the DB instance has deletion protection enabled. The database can’t be deleted when deletion protection is enabled. By default, deletion protection isn’t enabled. For more information, see Deleting a DB Instance. Possible values are: true, false.Optional
auto_minor_version_upgradeSpecifies whether minor version upgrades are applied automatically to the DB instance during the maintenance window. An outage occurs when all the following conditions are met: The automatic upgrade is enabled for the maintenance window. A newer minor version is available. RDS has enabled automatic patching for the engine version. If any of the preceding conditions isn’t met, Amazon RDS applies the change as soon as possible and doesn’t cause an outage. For an RDS Custom DB instance, don’t enable this setting. Otherwise, the operation returns an error. Possible values are: true, false.Optional
multi_azSpecifies whether the DB instance is a Multi-AZ deployment. Changing this parameter doesn’t result in an outage. The change is applied during the next maintenance window unless the ApplyImmediately parameter is enabled for this request. This setting doesn’t apply to RDS Custom DB instances. Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

aws-cloudtrail-trail-update#


Updates trail settings that control what events you are logging, and how to handle log files. Changes to a trail do not require stopping the CloudTrail service. Use this action to designate an existing bucket for log delivery. If the existing bucket has previously been a target for CloudTrail log files, an IAM policy exists for the bucket. UpdateTrail must be called from the Region in which the trail was created; otherwise, an InvalidHomeRegionException is thrown.

Base Command#

aws-cloudtrail-trail-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
nameSpecifies the name of the trail or trail ARN.Required
s3_bucket_nameSpecifies the name of the Amazon S3 bucket designated for publishing log files.Optional
s3_key_prefixSpecifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery.Optional
sns_topic_nameSpecifies the name of the Amazon SNS topic defined for notification of log file delivery.Optional
include_global_service_eventsSpecifies whether the trail is publishing events from global services such as IAM to the log files. Possible values are: true, false.Optional
is_multi_region_trailSpecifies whether the trail applies only to the current region or to all regions. The default is false. If the trail exists only in the current region and this value is set to true, shadow trails (replications of the trail) will be created in the other regions. If the trail exists in all regions and this value is set to false, the trail will remain in the region where it was created, and its shadow trails in other regions will be deleted. Possible values are: true, false.Optional
enable_log_file_validationSpecifies whether log file validation is enabled. The default is false. Possible values are: true, false.Optional
cloud_watch_logs_log_group_arnSpecifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs will be delivered. Not required unless you specify CloudWatchLogsRoleArn.Optional
cloud_watch_logs_role_arnSpecifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group.Optional
kms_key_idSpecifies the KMS key ID to use to encrypt the logs delivered by CloudTrail.Optional

Context Output#

PathTypeDescription
AWS.CloudTrail.Trail.TrailARNstringThe Amazon Resource Name (ARN) of the trail.
AWS.CloudTrail.Trail.NamestringThe name of the trail.
AWS.CloudTrail.Trail.S3BucketNamestringThe name of the Amazon S3 bucket into which CloudTrail delivers your trail files.
AWS.CloudTrail.Trail.S3KeyPrefixstringThe Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery.
AWS.CloudTrail.Trail.SnsTopicNamestringThe name of the Amazon SNS topic defined for notification of log file delivery.
AWS.CloudTrail.Trail.SnsTopicARNstringThe Amazon Resource Name (ARN) of the Amazon SNS topic defined for notification of log file delivery.
AWS.CloudTrail.Trail.IncludeGlobalServiceEventsbooleanSet to True to include AWS API calls from AWS global services such as IAM.
AWS.CloudTrail.Trail.IsMultiRegionTrailbooleanSpecifies whether the trail exists only in one region or exists in all regions.
AWS.CloudTrail.Trail.HomeRegionstringThe region in which the trail was created.
AWS.CloudTrail.Trail.LogFileValidationEnabledbooleanSpecifies whether log file validation is enabled.
AWS.CloudTrail.Trail.CloudWatchLogsLogGroupArnstringSpecifies an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs will be delivered.
AWS.CloudTrail.Trail.CloudWatchLogsRoleArnstringSpecifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group.
AWS.CloudTrail.Trail.KMSKeyIdstringSpecifies the KMS key ID that encrypts the logs delivered by CloudTrail.
AWS.CloudTrail.Trail.HasCustomEventSelectorsbooleanSpecifies if the trail has custom event selectors.
AWS.CloudTrail.Trail.HasInsightSelectorsbooleanSpecifies whether a trail has insight selectors enabled.
AWS.CloudTrail.Trail.IsOrganizationTrailbooleanSpecifies whether the trail is an organization trail.

aws-ec2-security-group-ingress-authorize#


Adds the specified inbound (ingress) rules to a security group.

Base Command#

aws-ec2-security-group-ingress-authorize

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
group_idThe ID of the security group.Required
protocolThe IP protocol: tcp, udp, icmp, or icmpv6. Use -1 to specify all protocols. When used with port and cidr arguments for simple rule authorization.Optional
portFor TCP or UDP: The range of ports to authorize (e.g., "80" or "80-443"). For ICMP: A single integer or range (type-code) representing the ICMP type and code. Use with protocol and cidr for simple rule authorization.Optional
cidrThe IPv4 address range in CIDR format (e.g., "0.0.0.0/0"). Use with protocol and port for simple rule authorization.Optional
ip_permissionsThe sets of IP permissions to authorize, in JSON format. Use this for complex rule configurations or when authorizing multiple rules. Cannot be used together with protocol/port/cidr arguments.Optional

Context Output#

There is no context output for this command.

aws-ec2-image-attribute-modify#


Modifies the specified attribute of the specified AMI.

Base Command#

aws-ec2-image-attribute-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
image_idThe ID of the AMI.Required
attributeThe AMI attribute to modify. Possible values are: description, launchPermission.Required
operation_typeThe operation to perform on the attribute. Possible values are: add, remove.Optional
user_idsThe AWS account IDs to add to or remove from the list of users that have launch permissions for the AMI.Optional
user_groupsThe user groups to add to or remove from the list of user groups that have launch permissions for the AMI.Optional
descriptionA new description for the AMI.Optional

Context Output#

There is no context output for this command.

aws-rds-db-cluster-snapshot-attribute-modify#


Modifies the attributes associated with a DB cluster snapshot.

Base Command#

aws-rds-db-cluster-snapshot-attribute-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
db_cluster_snapshot_identifierThe identifier for the DB cluster snapshot to modify the attributes for.Required
attribute_nameThe name of the DB cluster snapshot attribute to modify.Required
values_to_removeA CSV list of DB cluster snapshot attributes to remove from the attribute specified by AttributeName. Default Value all.Optional
values_to_addA CSV list of DB cluster snapshot attributes to add to the attribute specified by AttributeName.Optional

Context Output#

There is no context output for this command.

aws-s3-bucket-logging-put#


Configure logging settings for an AWS S3 bucket, allowing to monitor access to the bucket through detailed access logs that are delivered to a designated target bucket.

Base Command#

aws-s3-bucket-logging-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
bucketThe name of the bucket for which to set the logging parameters.Required
target_bucketThe name of the bucket where server access logs should be delivered. If this is NOT provided, logging will be disabled.Optional
target_prefixThe prefix to be used for log object keys (e.g., "logs/"). Objects will be stored as: targetBucket/targetPrefix/sourceBucket/YYYY-MM-DD-HH-MM-SS-UniqueString.Optional

Context Output#

There is no context output for this command.

aws-iam-login-profile-delete#


Deletes the password for the specified IAM user, which terminates the user's ability to access AWS services through the AWS Management Console.

Base Command#

aws-iam-login-profile-delete

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
user_nameThe name of the user whose password you want to delete.Required

Context Output#

There is no context output for this command.

aws-rds-db-snapshot-attribute-modify#


Adds or removes permission for the specified AWS account ID to restore the specified DB snapshot.

Base Command#

aws-rds-db-snapshot-attribute-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
db_snapshot_identifierThe identifier for the DB snapshot to modify the attributes for.Required
attribute_nameThe name of the DB snapshot attribute to modify.Required
values_to_addA list of DB snapshot attributes to add to the attribute specified by AttributeName.Optional
values_to_removeA list of DB snapshot attributes to remove from the attribute specified by AttributeName.Optional

Context Output#

There is no context output for this command.

aws-s3-bucket-policy-put#


Applies an Amazon S3 bucket policy to an Outposts bucket.

Base Command#

aws-s3-bucket-policy-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
bucketThe name of the bucket to which the policy will be applied.Required
policyThe bucket policy to apply as a JSON string.Required

Context Output#

There is no context output for this command.

aws-cloudtrail-logging-start#


Starts the recording of AWS API calls and log file delivery for a trail. For a trail that is enabled in all regions, this operation must be called from the region in which the trail was created. This operation cannot be called on the shadow trails (replicated trails in other regions) of a trail that is enabled in all regions.

Base Command#

aws-cloudtrail-logging-start

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
nameSpecifies the name or the CloudTrail ARN of the trail for which CloudTrail logs Amazon Web Services API calls. e.g. arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail.Required

Context Output#

There is no context output for this command.

aws-ec2-instance-attribute-modify#


Modifies the specified attribute of the specified instance. You can specify only one attribute at a time.

Base Command#

aws-ec2-instance-attribute-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
instance_idThe ID of the instance.Required
disable_api_stopIndicates whether an instance is enabled for stop protection. Possible values are: true, false.Optional
groupsA comma-separated list of security groups to replace the instance's current security groups. You must specify the ID of at least one security group, even if it’s just the default security group for the VPC.Optional
attributeThe name of the attribute to modify. Possible values: sourceDestCheck, groupSet, ebsOptimized, sriovNetSupport, enaSupport, enclaveOptions, disableApiStop. Possible values are: instanceType, kernel, ramdisk, userData, disableApiTermination, instanceInitiatedShutdownBehavior, rootDeviceName, blockDeviceMapping, productCodes, sourceDestCheck, groupSet, ebsOptimized, striovNetSupport, enaSupport, enclaveOptions, disableApiStop.Optional
valueA new value for the attribute. Use only with the kernel, ramdisk, userData, disableApiTermination, or instanceInitiatedShutdownBehavior attribute.Optional

Context Output#

There is no context output for this command.

aws-iam-access-key-update#


Changes the status of the specified access key from Active to Inactive, or vice versa. This operation can be used to disable a user's access key as part of a key rotation workflow.

Base Command#

aws-iam-access-key-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
access_key_idThe access key ID of the secret access key you want to update.Required
statusThe status you want to assign to the secret access key. Possible values are: Active, Inactive.Required
user_nameThe name of the user whose key you want to update. If you do not specify a user name, IAM determines the user name implicitly based on the AWS access key ID signing the request.Optional

Context Output#

There is no context output for this command.

aws-ec2-security-group-egress-revoke#


Removes the specified outbound (egress) rules from the specified security group.

Base Command#

aws-ec2-security-group-egress-revoke

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
group_idThe ID of the security group.Required
protocolThe IP protocol: tcp, udp, icmp, or icmpv6. Use -1 to specify all protocols. When used with port and cidr arguments for simple rule revocation.Optional
portFor TCP or UDP: The range of ports to revoke (e.g., "80" or "80-443"). For ICMP: A single integer or range (type-code) representing the ICMP type and code. Use with protocol and cidr for simple rule revocation.Optional
cidrThe IPv4 address range in CIDR format (e.g., "0.0.0.0/0"). Use with protocol and port for simple rule revocation.Optional
ip_permissionsThe sets of IP permissions to revoke, in JSON format. Use this for complex rule configurations or when revoking multiple rules. Cannot be used together with protocol/port/cidr arguments.Optional

Context Output#

There is no context output for this command.

aws-iam-role-policy-put#


Adds or updates an inline policy document that is embedded in the specified IAM role.

Base Command#

aws-iam-role-policy-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
role_nameThe name of the role to associate the policy with. This parameter allows (through its regex pattern ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-.Required
policy_nameThe name of the policy document. This parameter allows (through its regex pattern ) a string of characters consisting of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: _+=,.@-.Required
policy_documentThe policy document in JSON format. Must be a valid IAM policy document that defines the permissions for the role.Required

Context Output#

There is no context output for this command.

aws-rds-db-cluster-modify#


Modifies settings for an Amazon RDS DB cluster. Allows you to update cluster settings such as port, master credentials, VPC security groups, deletion protection, and other configuration options.

Base Command#

aws-rds-db-cluster-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
db_cluster_identifierThe DB cluster identifier for the cluster being modified. This parameter isn’t case-sensitive. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: Must match the identifier of an existing DB cluster.Required
deletion_protectionSpecifies whether the DB cluster has deletion protection enabled. The database can’t be deleted when deletion protection is enabled. By default, deletion protection isn’t enabled. Possible values are: true, false.Optional
enable_iam_database_authenticationSpecifies whether to enable mapping of Amazon Web Services Identity and Access Management (IAM) accounts to database accounts. By default, mapping isn’t enabled. Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

aws-s3-public-access-block-update#


Create or Modify the PublicAccessBlock configuration for an Amazon S3 bucket.

Base Command#

aws-s3-public-access-block-update

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
bucketThe name of the Amazon S3 bucket.Required
block_public_aclsSpecifies whether Amazon S3 should block public access control lists (ACLs) for this bucket and objects in this bucket. Possible values are: true, false.Optional
ignore_public_aclsSpecifies whether Amazon S3 should ignore public ACLs for this bucket and objects in this bucket. Possible values are: true, false.Optional
block_public_policySpecifies whether Amazon S3 should block public bucket policies for this bucket. Possible values are: true, false.Optional
restrict_public_bucketsSpecifies whether Amazon S3 should restrict public bucket policies for this bucket. Possible values are: true, false.Optional

Context Output#

There is no context output for this command.

aws-iam-user-policy-put#


Adds or updates an inline policy document that is embedded in the specified IAM user.

Base Command#

aws-iam-user-policy-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
user_nameThe name of the user to associate the policy with.Required
policy_nameThe name of the policy document.Required
policy_documentThe policy document in JSON format. Must be a valid IAM policy document that defines the permissions for the user.Required

Context Output#

There is no context output for this command.

aws-s3-bucket-versioning-put#


Sets the versioning state of an existing bucket.

Base Command#

aws-s3-bucket-versioning-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
bucketThe name of the bucket for which to set the logging parameters.Required
mfa_deleteSpecifies whether MFA delete is enabled in the bucket versioning configuration. This element is only returned if the bucket has been configured with MFA delete. If the bucket has never been so configured, this element is not returned.Optional
statusThe versioning state of the bucket. Possible values are: Enabled, Suspended.Required

Context Output#

There is no context output for this command.

aws-s3-bucket-acl-put#


Sets the access control list (ACL) permissions for an existing Amazon S3 bucket. This command allows you to define who can access the bucket and what actions they can perform, using predefined ACLs. Since 2023, all new S3 buckets block ACLs by default for better security.

Base Command#

aws-s3-bucket-acl-put

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
aclThe canned ACL to apply to the bucket. Possible values are: private, public-read, public-read-write, authenticated-read.Required
bucketThe bucket to which to apply the ACL.Required

Context Output#

There is no context output for this command.

aws-ec2-snapshot-attribute-modify#


Adds or removes permission settings for the specified snapshot. Note: snapshots encrypted with the AWS-managed default key (alias/aws/ebs) cannot be shared—use unencrypted snapshots or those encrypted with a customer-managed KMS key to allow permission modifications.

Base Command#

aws-ec2-snapshot-attribute-modify

Input#

Argument NameDescriptionRequired
account_idThe AWS account ID.Required
regionThe AWS region. Possible values are: us-east-1, us-east-2, us-west-1, us-west-2, af-south-1, ap-east-1, ap-south-2, ap-southeast-3, ap-southeast-5, ap-southeast-4, ap-south-1, ap-northeast-3, ap-northeast-2, ap-southeast-1, ap-southeast-2, ap-southeast-7, ap-northeast-1, ca-central-1, ca-west-1, eu-central-1, eu-west-1, eu-west-2, eu-south-1, eu-west-3, eu-south-2, eu-north-1, eu-central-2, il-central-1, mx-central-1, me-south-1, me-central-1, sa-east-1.Required
snapshot_idThe ID of the snapshot.Required
attributeThe snapshot attribute to modify. Default is createVolumePermission.Required
operation_typeThe operation to perform. Possible values are: add, remove.Required
user_idsA comma-separated list of AWS user account IDs to add to or remove from the list of users permitted to create EBS volumes from the snapshot.Optional
groupThe groups to add to or remove from the list of entities that have permission to create volumes from the snapshot. Possible values are: all.Optional

Context Output#

There is no context output for this command.