File tree Expand file tree Collapse file tree 4 files changed +51
-20
lines changed
integrations/event-bridge Expand file tree Collapse file tree 4 files changed +51
-20
lines changed Original file line number Diff line number Diff line change @@ -70,7 +70,7 @@ resource "aws_iam_role" "scanning_stackset_admin_role" {
7070 name = " AWSCloudFormationStackSetAdministrationRoleForScanning"
7171 tags = var. tags
7272
73- assume_role_policy = << EOF
73+ assume_role_policy = << EOF
7474{
7575 "Version": "2012-10-17",
7676 "Statement": [
@@ -84,7 +84,12 @@ resource "aws_iam_role" "scanning_stackset_admin_role" {
8484 ]
8585}
8686EOF
87- managed_policy_arns = [" arn:aws:iam::aws:policy/AWSCloudFormationFullAccess" ]
87+ }
88+
89+ resource "aws_iam_role_policy_attachments_exclusive" "scanning_stackset_admin_role_managed_policy" {
90+ count = ! var. auto_create_stackset_roles ? 0 : 1
91+ role_name = aws_iam_role. scanning_stackset_admin_role [0 ]. id
92+ policy_arns = [" arn:aws:iam::aws:policy/AWSCloudFormationFullAccess" ]
8893}
8994
9095resource "aws_iam_role_policy" "scanning_stackset_admin_role_policy" {
@@ -135,9 +140,12 @@ resource "aws_iam_role" "scanning_stackset_execution_role" {
135140 ]
136141}
137142EOF
138- managed_policy_arns = [
139- " arn:aws:iam::aws:policy/AWSCloudFormationFullAccess"
140- ]
143+ }
144+
145+ resource "aws_iam_role_policy_attachments_exclusive" "scanning_stackset_execution_role_managed_policy" {
146+ count = ! var. auto_create_stackset_roles ? 0 : 1
147+ role_name = aws_iam_role. scanning_stackset_execution_role [0 ]. id
148+ policy_arns = [" arn:aws:iam::aws:policy/AWSCloudFormationFullAccess" ]
141149}
142150
143151resource "aws_iam_role_policy" "scanning_stackset_execution_role_policy" {
Original file line number Diff line number Diff line change @@ -18,9 +18,9 @@ data "sysdig_secure_tenant_external_id" "external_id" {}
1818# Since this is not an Organizational deploy, create role/polices directly
1919# ----------------------------------------------------------
2020resource "aws_iam_role" "cspm_role" {
21- name = local. config_posture_role_name
22- tags = var. tags
23- assume_role_policy = << EOF
21+ name = local. config_posture_role_name
22+ tags = var. tags
23+ assume_role_policy = << EOF
2424{
2525 "Version": "2012-10-17",
2626 "Statement": [
@@ -40,7 +40,13 @@ resource "aws_iam_role" "cspm_role" {
4040 ]
4141}
4242EOF
43- managed_policy_arns = [" arn:aws:iam::aws:policy/SecurityAudit" ]
43+ }
44+
45+ resource "aws_iam_role_policy_attachments_exclusive" "cspm_role_managed_policy" {
46+ role_name = aws_iam_role. cspm_role . id
47+ policy_arns = [
48+ " arn:aws:iam::aws:policy/SecurityAudit"
49+ ]
4450}
4551
4652resource "aws_iam_role_policy" "cspm_role_policy" {
Original file line number Diff line number Diff line change @@ -59,7 +59,7 @@ resource "aws_iam_role" "event_bus_stackset_admin_role" {
5959 name = " AWSCloudFormationStackSetAdministrationRoleForEB"
6060 tags = var. tags
6161
62- assume_role_policy = << EOF
62+ assume_role_policy = << EOF
6363{
6464 "Version": "2012-10-17",
6565 "Statement": [
@@ -73,7 +73,14 @@ resource "aws_iam_role" "event_bus_stackset_admin_role" {
7373 ]
7474}
7575EOF
76- managed_policy_arns = [" arn:aws:iam::aws:policy/AWSCloudFormationFullAccess" ]
76+ }
77+
78+ resource "aws_iam_role_policy_attachments_exclusive" "event_bus_stackset_admin_role_managed_policy" {
79+ count = ! var. auto_create_stackset_roles ? 0 : 1
80+ role_name = aws_iam_role. event_bus_stackset_admin_role [0 ]. id
81+ policy_arns = [
82+ " arn:aws:iam::aws:policy/AWSCloudFormationFullAccess"
83+ ]
7784}
7885
7986# -----------------------------------------------------------------------------------------------------------------------------------------
@@ -105,7 +112,12 @@ resource "aws_iam_role" "event_bus_stackset_execution_role" {
105112 ]
106113}
107114EOF
108- managed_policy_arns = [
115+ }
116+
117+ resource "aws_iam_role_policy_attachments_exclusive" "event_bus_stackset_execution_role_managed_policy" {
118+ count = ! var. auto_create_stackset_roles ? 0 : 1
119+ role_name = aws_iam_role. event_bus_stackset_execution_role [0 ]. id
120+ policy_arns = [
109121 " arn:aws:iam::aws:policy/AWSCloudFormationFullAccess" ,
110122 " arn:aws:iam::aws:policy/AmazonEventBridgeFullAccess"
111123 ]
Original file line number Diff line number Diff line change @@ -43,23 +43,28 @@ resource "aws_iam_role" "onboarding_role" {
4343 ]
4444}
4545EOF
46- managed_policy_arns = compact ([
47- " arn:aws:iam::aws:policy/AWSAccountManagementReadOnlyAccess" ,
48- var . is_organizational ? " arn:aws:iam::aws:policy/AWSOrganizationsReadOnlyAccess" : " "
49- ])
5046
5147 lifecycle {
5248 ignore_changes = [tags ]
5349 }
5450}
5551
52+ resource "aws_iam_role_policy_attachments_exclusive" "onboarding_role_managed_policy" {
53+ role_name = aws_iam_role. onboarding_role . id
54+ policy_arns = compact ([
55+ " arn:aws:iam::aws:policy/AWSAccountManagementReadOnlyAccess" ,
56+ var . is_organizational ? " arn:aws:iam::aws:policy/AWSOrganizationsReadOnlyAccess" : " "
57+ ])
58+ }
59+
5660data "aws_caller_identity" "current" {}
5761
5862resource "sysdig_secure_cloud_auth_account" "cloud_auth_account" {
59- enabled = true
60- provider_id = data. aws_caller_identity . current . account_id
61- provider_type = " PROVIDER_AWS"
62- provider_alias = var. account_alias
63+ enabled = true
64+ provider_id = data. aws_caller_identity . current . account_id
65+ provider_type = " PROVIDER_AWS"
66+ provider_alias = var. account_alias
67+ regulatory_framework = " REGULATORY_FRAMEWORK_UNSPECIFIED"
6368
6469 component {
6570 type = " COMPONENT_TRUSTED_ROLE"
You can’t perform that action at this time.
0 commit comments