Skip to content

Commit b8b2c82

Browse files
authored
Remove CloudFormation access to S3 via ArtifactCopyPolicy and KMS access (#792)
* Remove CloudFormation access to S3 via ArtifactCopyPolicy and KMS secret access since it is not used anymore
1 parent 63c6a65 commit b8b2c82

File tree

1 file changed

+0
-21
lines changed

1 file changed

+0
-21
lines changed

src/rpdk/core/data/managed-upload-infrastructure.yaml

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -48,16 +48,6 @@ Resources:
4848
PolicyDocument:
4949
Version: "2012-10-17"
5050
Statement:
51-
- Sid: Allow CloudFormation to copy artifacts from the bucket
52-
Effect: Allow
53-
Principal:
54-
Service: cloudformation.amazonaws.com
55-
Action:
56-
- s3:ListBucket
57-
- s3:GetObject
58-
Resource:
59-
- !Sub "arn:${AWS::Partition}:s3:::${ArtifactBucket}"
60-
- !Sub "arn:${AWS::Partition}:s3:::${ArtifactBucket}/*"
6151
- Sid: Require Secure Transport
6252
Action: "s3:*"
6353
Effect: Deny
@@ -84,17 +74,6 @@ Resources:
8474
AWS: !Ref AWS::AccountId
8575
Action: kms:*
8676
Resource: "*"
87-
- Sid: Enable access for cloudformation to copy encrypted objects
88-
Effect: Allow
89-
Principal:
90-
Service: cloudformation.amazonaws.com
91-
Action:
92-
- "kms:Encrypt"
93-
- "kms:Decrypt"
94-
- "kms:ReEncrypt*"
95-
- "kms:GenerateDataKey*"
96-
- "kms:DescribeKey"
97-
Resource: "*"
9877

9978
LogAndMetricsDeliveryRole:
10079
Type: AWS::IAM::Role

0 commit comments

Comments
 (0)