Skip to content

Commit 17d291e

Browse files
authored
Merge pull request #16 from aws-samples/Swara-changes
AddedServicesAsSupportedbyRCPs
2 parents 6a902d2 + 2743866 commit 17d291e

6 files changed

+28
-9
lines changed

Establish-intra-organization-boundaries/Deny-access-to-resources-in-an-organizational-unit,except-for-principals-from-the-same-or-specified-organizational-unit.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,10 @@
88
"s3:*",
99
"sqs:*",
1010
"kms:*",
11-
"secretsmanager:*"
11+
"secretsmanager:*",
12+
"logs:*",
13+
"dynamodb:*",
14+
"ecr:*",
1215
],
1316
"Resource":"*",
1417
"Condition":{

Establish-intra-organization-boundaries/Deny-resource-access-if-the-resource-belongs-to-a-specific-organizational-unit.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,13 @@
1515
"sts:GetFederationToken",
1616
"sts:GetServiceBearerToken",
1717
"sts:GetSessionToken",
18-
"sts:SetContext"
18+
"sts:SetContext",
19+
"cognito-identity:*",
20+
"cognito-idp:*",
21+
"logs:*",
22+
"dynamodb:*",
23+
"ecr:*",
24+
"aoss:*"
1925
],
2026
"Resource": "*",
2127
"Condition": {

Restrict-resource-access-patterns/Enforce-controls-on-AWS-services-that-use-service-principals-to-access-your-resources.json

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,16 @@
66
"Principal": "*",
77
"Action": [
88
"s3:*",
9-
"sqs:*",
9+
"sts:*",
1010
"kms:*",
11+
"sqs:*",
1112
"secretsmanager:*",
12-
"sts:*",
13-
"aoss:*",
14-
"ecr:*"
13+
"cognito-identity:*",
14+
"cognito-idp:*",
15+
"logs:*",
16+
"dynamodb:*",
17+
"ecr:*",
18+
"aoss:*"
1519
],
1620
"Resource": "*",
1721
"Condition": {

Restrict-resource-access-patterns/Restrict-access-to-only-HTTPS-connections-to-your-resources.json

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,17 @@
55
"Effect": "Deny",
66
"Principal": "*",
77
"Action": [
8-
"sts:*",
98
"s3:*",
9+
"sts:*",
10+
"kms:*",
1011
"sqs:*",
1112
"secretsmanager:*",
12-
"kms:*"
13+
"cognito-identity:*",
14+
"cognito-idp:*",
15+
"logs:*",
16+
"dynamodb:*",
17+
"ecr:*",
18+
"aoss:*"
1319
],
1420
"Resource": "*",
1521
"Condition": {

Service-specific-controls/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@
4646

4747
| Included Policy | Rationale |
4848
|-------------|-------------|
49-
|[Protect EKS Pod Identities Session Tags](STS-ProtectEKSPodIdentitiesTags.json) | Protect the session tags set by EKS pod identities. This RCP helps ensure that only AWS service principals can assume IAM role sessions with the EKS pod identity specific session tags, while allowing the role-sessions assumed by EKS pod identities to continue to set them as transitive session tags. This pairs well with a [service control policy that restricts the ability for someone to use the iam:TagRole and iam:TagUser permission from creating tags on IAM roles and users with the expected keys and values by EKS pod identities](https://github.com/aws-samples/service-control-policy-examples/blob/main/Service-specific-controls/Amazon-EKS/ProtectPodIdentitiesTagsOnRolesAndUsers.json). The logic is that "Only an AWS service Principal can make a request for a role-session with any of those tags, or a session/role/user that already has one of those tags set". |
49+
|[Protect EKS Pod Identity Session Tags](STS-Protect-EKS-pod-identities-tags.json) | Protect the session tags set by EKS pod identities. This RCP helps ensure that only AWS service principals can assume IAM role sessions with the EKS pod identity specific session tags, while allowing the role-sessions assumed by EKS pod identities to continue to set them as transitive session tags. This pairs well with a [service control policy that restricts the ability for someone to use the iam:TagRole and iam:TagUser permission from creating tags on IAM roles and users with the expected keys and values by EKS pod identities](https://github.com/aws-samples/service-control-policy-examples/blob/main/Service-specific-controls/Amazon-EKS/ProtectPodIdentitiesTagsOnRolesAndUsers.json). The logic is that "Only an AWS service Principal can make a request for a role-session with any of those tags, or a session/role/user that already has one of those tags set". |
5050
|[Protect IAM Roles Anywhere Session Tags](STS-protect-IAMRA-session-tags.json) | Protect the session tags set by IAM Roles Anywhere. This RCP helps ensure that only AWS service principals can assume IAM role sessions with the IAM Roles Anywhere session tags, while allowing the role-sessions assumed by IAM Roles Anywhere to continue to set them as transitive session tags. This pairs well with a [service control policy that restricts the ability for someone to use the iam:TagRole and iam:TagUser permission from creating tags on IAM roles and users with the expected keys and values by IAM Roles Anywhere](https://github.com/aws-samples/service-control-policy-examples/blob/main/Service-specific-controls/AWS-IAMRolesAnywhere/Protect-IAMRA-Specific-Tags.json). The logic is that "Only an AWS service Principal can make a request for a role-session with any of those tags, or a session/role/user that already has one of those tags set". |
5151

5252

Service-specific-controls/STS-ProtectEKSPodIdentitiesTags.json renamed to Service-specific-controls/STS-Protect-EKS-pod-identities-tags.json

File renamed without changes.

0 commit comments

Comments
 (0)