diff --git a/rules/aws_cloudtrail_rules/aws_iam_assume_role_blocklist_ignored.yml b/rules/aws_cloudtrail_rules/aws_iam_assume_role_blocklist_ignored.yml index 23f711ecd..aefc7715b 100644 --- a/rules/aws_cloudtrail_rules/aws_iam_assume_role_blocklist_ignored.yml +++ b/rules/aws_cloudtrail_rules/aws_iam_assume_role_blocklist_ignored.yml @@ -80,7 +80,7 @@ Tests: { "attributes": { - "creationDate": "2019-01-00T00:00:00Z", + "creationDate": "2019-01-01T00:00:00Z", "mfaAuthenticated": "true", }, }, @@ -143,7 +143,7 @@ Tests: { "attributes": { - "creationDate": "2019-01-00T00:00:00Z", + "creationDate": "2019-01-01T00:00:00Z", "mfaAuthenticated": "true", }, }, @@ -207,7 +207,7 @@ Tests: { "attributes": { - "creationDate": "2019-01-00T00:00:00Z", + "creationDate": "2019-01-01T00:00:00Z", "mfaAuthenticated": "true", }, }, diff --git a/rules/aws_cloudtrail_rules/aws_root_access_key_created.yml b/rules/aws_cloudtrail_rules/aws_root_access_key_created.yml index f907afb23..8cfb26414 100644 --- a/rules/aws_cloudtrail_rules/aws_root_access_key_created.yml +++ b/rules/aws_cloudtrail_rules/aws_root_access_key_created.yml @@ -76,7 +76,7 @@ Tests: "eventID": "1111", "eventName": "CreateAccessKey", "eventSource": "iam.amazonaws.com", - "eventTime": "2019-01-00T00:00:00Z", + "eventTime": "2019-01-01T00:00:00Z", "eventType": "AwsApiCall", "eventVersion": "1.05", "recipientAccountId": "123456789012", @@ -105,7 +105,7 @@ Tests: { "attributes": { - "creationDate": "2019-01-00T00:00:00Z", + "creationDate": "2019-01-01T00:00:00Z", "mfaAuthenticated": "true", }, },