Skip to content
Merged
Changes from 1 commit
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
e764a5b
🔒 improve AWS Cloud IAM policy security by restricting resource scopes
kenibrewer Sep 18, 2025
e265312
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Nov 27, 2025
1e71015
Update aws-cloud.md
justinegeffen Nov 27, 2025
d57f632
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Dec 11, 2025
40bbee4
Update platform-cloud/docs/compute-envs/aws-cloud.md
justinegeffen Jan 23, 2026
d1f43ae
Update platform-cloud/docs/compute-envs/aws-cloud.md
justinegeffen Jan 23, 2026
c219b70
Update platform-cloud/docs/compute-envs/aws-cloud.md
justinegeffen Jan 23, 2026
b61badf
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 23, 2026
4425150
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 23, 2026
a470bb2
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 23, 2026
e57d4d4
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 24, 2026
136c8bd
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 26, 2026
9943524
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 29, 2026
10ee3cf
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 29, 2026
8d717c0
Update platform-cloud/docs/compute-envs/aws-cloud.md
justinegeffen Jan 29, 2026
26d7706
Update platform-cloud/docs/compute-envs/aws-cloud.md
gavinelder Jan 29, 2026
9bef498
Update platform-cloud/docs/compute-envs/aws-cloud.md
gavinelder Jan 29, 2026
1c828a8
Update platform-cloud/docs/compute-envs/aws-cloud.md
gavinelder Jan 29, 2026
e827b23
Update platform-cloud/docs/compute-envs/aws-cloud.md
justinegeffen Jan 30, 2026
b6298fc
Provide generic wide-open policy as quickstart
bebosudo Jan 30, 2026
c28abce
Apply suggestion from @justinegeffen
justinegeffen Jan 30, 2026
8bfe8f9
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 30, 2026
38fbbff
Update aws-cloud.md
justinegeffen Jan 30, 2026
9ba74ba
Merge branch 'master' into docs/aws-cloud-iam-policy-security
justinegeffen Jan 30, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
63 changes: 55 additions & 8 deletions platform-cloud/docs/compute-envs/aws-cloud.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,11 +70,21 @@ The following permissions are required to provision resources in the AWS account
"iam:CreateInstanceProfile",
"iam:AttachRolePolicy",
"iam:PutRolePolicy",
"iam:PassRole",
"iam:TagRole",
"iam:TagInstanceProfile"
],
"Resource": "*"
"Resource": [
"arn:aws:iam::*:role/TowerForge*",
"arn:aws:iam::*:instance-profile/TowerForge*"
]
},
{
"Sid": "AwsCloudCreatePassRole",
"Effect": "Allow",
"Action": [
"iam:PassRole"
],
"Resource": "arn:aws:iam::*:role/TowerForge*"
}
]
}
Expand Down Expand Up @@ -111,15 +121,49 @@ The following permissions are required to launch pipelines, run Studio sessions,
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AwsCloudLaunch",
"Sid": "AwsCloudLaunchEC2",
"Effect": "Allow",
"Action": [
"ec2:RunInstances",
"ec2:DescribeInstances",
"ec2:CreateTags",
"ec2:TerminateInstances",
"ec2:DeleteTags",
"logs:GetLogEvents",
"ec2:DeleteTags"
],
"Resource": [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:subnet/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:key-pair/*",
"arn:aws:ec2:*:*:image/*"
]
},
{
"Sid": "AwsCloudLaunchInstances",
"Effect": "Allow",
"Action": [
"ec2:DescribeInstances",
"ec2:TerminateInstances"
],
"Resource": "*",
"Condition": {
"StringLike": {
"ec2:ResourceTag/Name": "TowerForge-*"
}
}
},
{
"Sid": "AwsCloudLaunchLogs",
"Effect": "Allow",
"Action": [
"logs:GetLogEvents"
],
"Resource": "arn:aws:logs:*:*:log-group:*:log-stream:*"
},
{
"Sid": "AwsCloudLaunchS3",
"Effect": "Allow",
"Action": [
"s3:GetObject"
],
"Resource": "*"
Expand Down Expand Up @@ -149,7 +193,10 @@ The following permissions are required to remove resources created by Seqera whe
"iam:DetachRolePolicy",
"iam:DeleteRolePolicy"
],
"Resource": "*"
"Resource": [
"arn:aws:iam::*:role/TowerForge*",
"arn:aws:iam::*:instance-profile/TowerForge*"
]
}
]
}
Expand Down