Skip to content

Commit

Permalink
Merge pull request #711 from udondan/update-aws-managed-policies
Browse files Browse the repository at this point in the history
  • Loading branch information
udondan committed May 18, 2024
2 parents f0d7929 + fe36fdf commit 571c0c6
Show file tree
Hide file tree
Showing 6 changed files with 61 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,10 @@
"iam:GetUserPolicy",
"iam:GetAccountPasswordPolicy",
"iam:GetAccountSummary",
"iam:ListAttachedGroupPolicies",
"iam:ListAttachedUserPolicies",
"iam:ListEntitiesForPolicy",
"iam:ListGroupsForUser",
"iam:ListGroupPolicies",
"iam:ListGroups",
"iam:ListOpenIdConnectProviders",
Expand Down Expand Up @@ -139,6 +142,7 @@
"es:DescribeDomains",
"es:DescribeDomain",
"es:DescribeDomainConfig",
"es:ListDomainNames",
"organizations:DescribeOrganization",
"organizations:DescribePolicy",
"rds:DescribeCertificates",
Expand Down Expand Up @@ -209,6 +213,7 @@
"apigateway:GET"
],
"Resource": [
"arn:aws:apigateway:*::/restapis",
"arn:aws:apigateway:*::/restapis/*/stages/*",
"arn:aws:apigateway:*::/restapis/*/stages"
],
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -326,6 +326,19 @@
"Resource": [
"arn:aws:cloudformation:*:*:stack/*"
]
},
{
"Sid": "RecoveryPointTaggingPermissions",
"Effect": "Allow",
"Action": [
"backup:TagResource"
],
"Resource": "arn:aws:backup:*:*:recovery-point:*",
"Condition": {
"StringEquals": {
"aws:PrincipalAccount": "${aws:ResourceAccount}"
}
}
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -458,6 +458,19 @@
"ssm-sap:ListTagsForResource"
],
"Resource": "arn:aws:ssm-sap:*:*:*"
},
{
"Sid": "RecoveryPointTaggingPermissions",
"Effect": "Allow",
"Action": [
"backup:TagResource"
],
"Resource": "arn:aws:backup:*:*:recovery-point:*",
"Condition": {
"StringEquals": {
"aws:PrincipalAccount": "${aws:ResourceAccount}"
}
}
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,13 @@
"Version": "2012-10-17",
"Statement": [
{
"Sid": "CloudWatchGetMetricDataPermissions",
"Effect": "Allow",
"Action": "cloudwatch:GetMetricData",
"Resource": "*"
},
{
"Sid": "EventBridgePermissionsForAwsBackupManagedRule",
"Effect": "Allow",
"Action": [
"events:DeleteRule",
Expand All @@ -23,11 +25,13 @@
]
},
{
"Sid": "EventBridgeListRulesPermissions",
"Effect": "Allow",
"Action": "events:ListRules",
"Resource": "*"
},
{
"Sid": "KmsPermissions",
"Effect": "Allow",
"Action": [
"kms:Decrypt",
Expand All @@ -41,6 +45,7 @@
}
},
{
"Sid": "S3BucketPermissions",
"Effect": "Allow",
"Action": [
"s3:GetBucketTagging",
Expand All @@ -57,6 +62,7 @@
"Resource": "arn:aws:s3:::*"
},
{
"Sid": "S3ObjectPermissions",
"Effect": "Allow",
"Action": [
"s3:GetObjectAcl",
Expand All @@ -69,9 +75,23 @@
"Resource": "arn:aws:s3:::*/*"
},
{
"Sid": "S3ListBucketPermissions",
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "*"
},
{
"Sid": "RecoveryPointTaggingPermissions",
"Effect": "Allow",
"Action": [
"backup:TagResource"
],
"Resource": "arn:aws:backup:*:*:recovery-point:*",
"Condition": {
"StringEquals": {
"aws:PrincipalAccount": "${aws:ResourceAccount}"
}
}
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
"Effect": "Allow",
"Action": [
"application-autoscaling:DescribeScalingPolicies",
"application-signals:*",
"autoscaling:DescribeAutoScalingGroups",
"autoscaling:DescribePolicies",
"cloudwatch:*",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@
"Effect": "Allow",
"Action": [
"application-autoscaling:DescribeScalingPolicies",
"application-signals:BatchGet*",
"application-signals:Get*",
"application-signals:List*",
"autoscaling:Describe*",
"cloudwatch:BatchGet*",
"cloudwatch:Describe*",
Expand Down Expand Up @@ -42,6 +45,12 @@
"oam:ListAttachedLinks"
],
"Resource": "arn:aws:oam:*:*:sink/*"
},
{
"Sid": "CloudWatchReadOnlyGetRolePermissions",
"Effect": "Allow",
"Action": "iam:GetRole",
"Resource": "arn:aws:iam::*:role/aws-service-role/application-signals.cloudwatch.amazonaws.com/AWSServiceRoleForCloudWatchApplicationSignals"
}
]
}

0 comments on commit 571c0c6

Please sign in to comment.