diff --git a/aws/table_aws_iam_account_summary.go b/aws/table_aws_iam_account_summary.go index 871377729..fd38d5c8d 100644 --- a/aws/table_aws_iam_account_summary.go +++ b/aws/table_aws_iam_account_summary.go @@ -14,6 +14,7 @@ type awsIamAccountSummary struct { AccessKeysPerUserQuota int32 AccountAccessKeysPresent int32 AccountMFAEnabled bool + AccountPasswordPresent bool AccountSigningCertificatesPresent int32 AssumeRolePolicySizeQuota int32 AttachedPoliciesPerGroupQuota int32 @@ -72,6 +73,11 @@ func tableAwsIamAccountSummary(_ context.Context) *plugin.Table { Type: proto.ColumnType_BOOL, Transform: transform.FromField("AccountMFAEnabled"), }, + { + Name: "account_password_present", + Description: "Specifies whether the root password is set for the account.", + Type: proto.ColumnType_BOOL, + }, { Name: "account_signing_certificates_present", Description: "Specifies the number of account signing certificates present.", @@ -245,6 +251,7 @@ func listAccountSummary(ctx context.Context, d *plugin.QueryData, _ *plugin.Hydr AccessKeysPerUserQuota: summaryMap["AccessKeysPerUserQuota"], AccountAccessKeysPresent: summaryMap["AccountAccessKeysPresent"], AccountMFAEnabled: summaryMap["AccountMFAEnabled"] == int32(1), + AccountPasswordPresent: summaryMap["AccountPasswordPresent"] == int32(1), AccountSigningCertificatesPresent: summaryMap["AccountSigningCertificatesPresent"], AssumeRolePolicySizeQuota: summaryMap["AssumeRolePolicySizeQuota"], AttachedPoliciesPerGroupQuota: summaryMap["AttachedPoliciesPerGroupQuota"],