Pattern: Use of *
for AWS IAM KMS policy
Issue: -
IAM policies define which actions an identity (user, group, or role) can perform on which resources. Following security best practices, AWS recommends that you allow least privilege. In other words, you should grant to identities only the kms:Decrypt
or kms:ReEncryptFrom
permissions and only for the keys that are required to perform a task.
Resolution: Scope down the resources of the IAM policy to specific keys.
Example of incorrect code:
data "aws_iam_policy_document" "kms_policy" {
statement {
principals {
type = "AWS"
identifiers = ["arn:aws:iam::${data.aws_caller_identity.current.account_id}:root"]
}
actions = ["kms:*"]
resources = ["*"]
}
}
Example of correct code:
data "aws_iam_policy_document" "kms_policy" {
statement {
principals {
type = "AWS"
identifiers = ["arn:aws:iam::${data.aws_caller_identity.current.account_id}:root"]
}
actions = ["kms:*"]
resources = [aws_kms_key.main.arn]
}
}