Skip to content

Commit f583501

Browse files
committed
major refactor resiliency-hub-to avoid buckets
1 parent 78c8b6f commit f583501

File tree

3 files changed

+270
-1117
lines changed

3 files changed

+270
-1117
lines changed

data-collection/deploy/deploy-data-collection.yaml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1472,16 +1472,15 @@ Resources:
14721472
StepFunctionTemplate: !FindInMap [StepFunctionCode, standalone-state-machine, TemplatePath]
14731473
StepFunctionExecutionRoleARN: !GetAtt StepFunctionExecutionRole.Arn
14741474
SchedulerExecutionRoleARN: !GetAtt SchedulerExecutionRole.Arn
1475-
1475+
14761476
ResilienceHubModule:
14771477
Type: AWS::CloudFormation::Stack
14781478
Condition: DeployResilienceHubModule
14791479
Properties:
14801480
TemplateURL: !Sub "https://${CFNSourceBucket}.s3.${AWS::URLSuffix}/cfn/data-collection/v3.10.0/module-resilience-hub.yaml"
14811481
Parameters:
14821482
DestinationBucket: !Ref S3Bucket
1483-
ManagementRoleName: !Sub "${ResourcePrefix}${ManagementAccountRole}"
1484-
ManagementAccountID: !Ref ManagementAccountID
1483+
MultiAccountRoleName: !Sub "${ResourcePrefix}${MultiAccountRoleName}"
14851484
DataBucketsKmsKeysArns: !Ref DataBucketsKmsKeysArns
14861485
Schedule: !Ref ScheduleFrequent
14871486
ResourcePrefix: !Ref ResourcePrefix

data-collection/deploy/deploy-in-linked-account.yaml

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Conditions:
123123
IncludeBudgetsModulePolicy: !Equals [!Ref IncludeBudgetsModule, "yes"]
124124
IncludeTransitGatewayModulePolicy: !Equals [!Ref IncludeTransitGatewayModule, "yes"]
125125
IncludeServiceQuotasModulePolicy: !Equals [!Ref IncludeServiceQuotasModule, "yes"]
126-
IncludeResilienceHubModulePolicy: !Equals [!Ref IncludeResilienceHubModule, "yes"]
126+
IncludeResilienceHubModulePolicy: !Equals [!Ref IncludeResilienceHubModule, "yes"]
127127

128128
Outputs:
129129
LambdaRole:
@@ -430,36 +430,37 @@ Resources:
430430
rules_to_suppress:
431431
- id: W12
432432
reason: "Policy is used for scanning of a wide range of resources"
433-
434433
# Resilience Hub policy
435434
ResilienceHubPolicy:
436435
Type: 'AWS::IAM::Policy'
437436
Condition: IncludeResilienceHubModulePolicy
438437
Properties:
439438
PolicyName: ResilienceHubPolicy
440-
PolicyDocument:
439+
PolicyDocument:
441440
Version: "2012-10-17"
442441
Statement:
443-
- Sid: VisualEditor0
442+
- Sid: ResilienceHubRestricted
444443
Effect: Allow
445444
Action:
446-
- resiliencehub:ListSopRecommendations
447-
- resiliencehub:DescribeAppAssessment
448-
- resiliencehub:ListAppComponentRecommendations
449-
- resiliencehub:ListAlarmRecommendations
445+
- "resiliencehub:DescribeAppAssessment"
446+
- "resiliencehub:ListSopRecommendations"
447+
- "resiliencehub:ListAppComponentRecommendations"
448+
- "resiliencehub:ListAlarmRecommendations"
450449
Resource: !Sub "arn:${AWS::Partition}:resiliencehub:*:${AWS::AccountId}:app/*"
451-
- Sid: VisualEditor1
450+
- Sid: ResilienceHubNonRestricted
452451
Effect: Allow
453452
Action:
454-
- resiliencehub:ListApps
455-
- resiliencehub:DescribeMetricsExport
456-
- resiliencehub:ListAppAssessments
457-
- resiliencehub:StartMetricsExport
458-
Resource: '*'
453+
- "resiliencehub:ListApps"
454+
- "resiliencehub:DescribeApp"
455+
- "resiliencehub:ListAppAssessments"
456+
- "resiliencehub:ListAppAssessmentComplianceDrift"
457+
- "resiliencehub:ListTestRecommendations"
458+
- "resiliencehub:DescribeResiliencyPolicy"
459+
Resource: "*" # Wildcard required as actions do not support resource-level permissions
459460
Roles:
460461
- Ref: LambdaRole
461462
Metadata:
462463
cfn_nag:
463464
rules_to_suppress:
464465
- id: W12
465-
reason: "Policy is used for scanning of a wide range of resources"
466+
reason: "Policy is used for scanning of a wide range of resources"

0 commit comments

Comments
 (0)