@@ -104,6 +104,7 @@ resource "aws_iam_policy" "dynamodb_management" {
104104 " dynamodb:DeleteTable" ,
105105 " dynamodb:CreateTable" ,
106106 " dynamodb:TagResource" ,
107+ " dynamodb:UntagResource" ,
107108 " dynamodb:ListTagsOfResource" ,
108109 " dynamodb:UpdateTable" ,
109110 ],
@@ -178,7 +179,8 @@ resource "aws_iam_policy" "s3_management" {
178179 " s3:PutBucketLogging" ,
179180 " s3:GetObjectTagging" ,
180181 " s3:PutObjectTagging" ,
181- " s3:GetObjectVersion"
182+ " s3:GetObjectVersion" ,
183+ " s3:PutBucketTagging" ,
182184 ],
183185 Resource = [
184186 " arn:aws:s3:::*eligibility-signposting-api-${ var . environment } -eli-rules" ,
@@ -299,9 +301,11 @@ resource "aws_iam_policy" "api_infrastructure" {
299301 " logs:AssociateKmsKey" ,
300302 " logs:CreateLogGroup" ,
301303 " logs:PutMetricFilter" ,
304+ " logs:TagResource" ,
302305
303306 # EC2 permissions
304307 " ec2:CreateTags" ,
308+ " ec2:DeleteTags" ,
305309 " ec2:CreateNetworkAclEntry" ,
306310 " ec2:CreateNetworkAcl" ,
307311 " ec2:AssociateRouteTable" ,
@@ -357,6 +361,7 @@ resource "aws_iam_policy" "api_infrastructure" {
357361 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/vpc/*" ,
358362 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/lambda/*" ,
359363 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/apigateway/*" ,
364+ " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/eligibility-signposting-api-${ var . environment } -audit/*" ,
360365 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:NHSDAudit_trail_log_group*" ,
361366 " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/${ var . environment } /*" ,
362367 " arn:aws:ssm:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :parameter/splunk/*" ,
@@ -411,6 +416,7 @@ resource "aws_iam_policy" "kms_creation" {
411416 " kms:UpdateKeyDescription" ,
412417 " kms:CreateGrant" ,
413418 " kms:TagResource" ,
419+ " kms:UntagResource" ,
414420 " kms:EnableKeyRotation" ,
415421 " kms:ScheduleKeyDeletion" ,
416422 " kms:PutKeyPolicy" ,
@@ -459,6 +465,7 @@ resource "aws_iam_policy" "iam_management" {
459465 " iam:TagRole" ,
460466 " iam:PassRole" ,
461467 " iam:TagPolicy" ,
468+ " iam:UntagPolicy" ,
462469 ],
463470 Resource = [
464471 # Lambda role
@@ -564,6 +571,8 @@ resource "aws_iam_policy" "cloudwatch_management" {
564571 " logs:ListTagsForResource" ,
565572 " logs:DescribeLogGroups" ,
566573 " logs:PutRetentionPolicy" ,
574+ " logs:TagResource" ,
575+ " logs:UntagResource" ,
567576
568577 " cloudwatch:PutMetricAlarm" ,
569578 " cloudwatch:DeleteAlarms" ,
@@ -589,7 +598,8 @@ resource "aws_iam_policy" "cloudwatch_management" {
589598 Resource = [
590599 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/*" ,
591600 " arn:aws:cloudwatch:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :alarm:*" ,
592- " arn:aws:sns:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :cloudwatch-security-alarms*"
601+ " arn:aws:sns:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :cloudwatch-security-alarms*" ,
602+ " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/apigateway/default-eligibility-signposting-api*" ,
593603 ]
594604 }
595605 ]
0 commit comments