Skip to content
This repository has been archived by the owner on Nov 14, 2024. It is now read-only.

IAM::Role PermissionBoundary #6

Open
ambsw-technology opened this issue Aug 3, 2020 · 1 comment
Open

IAM::Role PermissionBoundary #6

ambsw-technology opened this issue Aug 3, 2020 · 1 comment

Comments

@ambsw-technology
Copy link
Contributor

ambsw-technology commented Aug 3, 2020

I have a customer who cannot create Roles without incorporating a PermissionsBoundary. My initialization templates deploy a couple of your custom resources (cfn-certificate-provider, cfn-lb-ip-address-provider) and, of course, lambda-based Custom Resources include a Role. I'd like to submit PRs to the two I'm currently using to add a parameter to support this, but wanted to open the issue here in case it makes sense to incorporate it into your template as well.

@ambsw-technology
Copy link
Contributor Author

Apparently this situation isn't terribly common, but my best guess is that it's motivated by this:

How can I use permissions boundaries to limit the scope of IAM users and roles and prevent privilege escalation?

The client confirmed that every Role must have the permission boundary attached.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant