Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update AWSCloudFormationStackSetExecutionRole to include itself as principal #190

Closed
silavjy opened this issue Dec 19, 2022 · 0 comments
Closed
Assignees
Labels
enhancement New feature or request important

Comments

@silavjy
Copy link
Contributor

silavjy commented Dec 19, 2022

AWS has changed its policy regarding trust policies on roles granting permission to principals.

"...a role trust policy must explicitly grant permission to the principals, including the role itself, that need to assume it under the specified conditions..We are contacting you because our data suggests that your AWS account may have one or more IAM Roles that assumes itself based on the permissions and conditions in its identity-based policy without explicitly granted permission in its role trust policy."

More to be found on https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request important
Projects
None yet
Development

No branches or pull requests

1 participant