Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restrict Lambda IAM permissions #5

Closed
alexcasalboni opened this issue Apr 26, 2017 · 0 comments · Fixed by #22
Closed

Restrict Lambda IAM permissions #5

alexcasalboni opened this issue Apr 26, 2017 · 0 comments · Fixed by #22
Assignees

Comments

@alexcasalboni
Copy link
Owner

The current role has full access to AWS Lambda:

iamRoleStatements:
    - Effect: Allow
      Action:
        - 'lambda:*'
      Resource: '*'

Since we want the lambdaARN to be given at runtime, we can't really restrict the Resource parameter. We could restrict the set of actions, though. Also, experienced users can always force Resource to be the Lambda Function(s) they want to optimize.

As far as actions are concerned, Initializer, Executor, Finalizer and Cleaner need the following Lambda permissions (only 7 out of 28):

  • GetAlias
  • UpdateFunctionConfiguration
  • PublishVersion
  • DeleteFunction (always with Qualifier)
  • CreateAlias
  • DeleteAlias
  • Invoke
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant