|
@@ -28,6 +28,25 @@ data "aws_iam_policy_document" "mdr_terraformer" {
|
|
|
]
|
|
|
}
|
|
|
|
|
|
+ statement {
|
|
|
+ sid = "AllowPassRoleForLegacyAccountRoles"
|
|
|
+ effect = "Allow"
|
|
|
+ actions = [
|
|
|
+ "iam:PassRole",
|
|
|
+ ]
|
|
|
+
|
|
|
+ resources = [
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/vault-instance-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/splunk-aws-instance-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/salt-master-instance-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/portal-instance-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/portal-data-sync-lambda-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/msoc-default-instance-role",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/ecsFargateTaskExecutionRole",
|
|
|
+ "arn:${local.aws_partition}:iam::${local.aws_account}:role/dlm-lifecycle-role",
|
|
|
+ ]
|
|
|
+ }
|
|
|
+
|
|
|
statement {
|
|
|
sid = "AssumeThisRoleInOtherAccounts"
|
|
|
effect = "Allow"
|