deploy-boundary.json 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. {
  2. "Version": "2012-10-17",
  3. "Statement": [
  4. {
  5. "Sid": "CreateOrChangeOnlyWithBoundary",
  6. "Effect": "Allow",
  7. "Action": [
  8. "iam:CreateRole",
  9. "iam:AttachRolePolicy",
  10. "iam:PutRolePermissionsBoundary",
  11. "iam:PutRolePolicy"
  12. ],
  13. "Resource": "arn:${aws_partition}:iam::${account_id}:role/${role_namespace}/*",
  14. "Condition": {
  15. "StringEquals": {
  16. "iam:PermissionsBoundary": "${permission_boundary}"
  17. }
  18. }
  19. },
  20. {
  21. "Sid": "RoleInNamespace",
  22. "Effect": "Allow",
  23. "Action": [
  24. "iam:TagRole",
  25. "iam:GetRolePolicy",
  26. "iam:GetRole",
  27. "iam:DeleteRole",
  28. "iam:PassRole",
  29. "iam:DetachRolePolicy",
  30. "iam:DeleteRolePolicy"
  31. ],
  32. "Resource": "arn:${aws_partition}:iam::${account_id}:role/${role_namespace}/*"
  33. },
  34. {
  35. "Sid": "PolicyInNamespace",
  36. "Effect": "Allow",
  37. "Action": [
  38. "iam:CreatePolicy",
  39. "iam:DeletePolicy",
  40. "iam:DeletePolicyVersion",
  41. "iam:GetPolicy",
  42. "iam:GetPolicyVersion",
  43. "iam:SetDefaultPolicyVersion"
  44. ],
  45. "Resource": "arn:${aws_partition}:iam::${account_id}:policy/${policy_namespace}/*"
  46. },
  47. {
  48. "Sid": "InstanceProfileInNamespace",
  49. "Effect": "Allow",
  50. "Action": [
  51. "iam:CreateInstanceProfile",
  52. "iam:RemoveRoleFromInstanceProfile",
  53. "iam:DeleteInstanceProfile",
  54. "iam:AddRoleToInstanceProfile",
  55. "iam:GetInstanceProfile"
  56. ],
  57. "Resource": "arn:${aws_partition}:iam::${account_id}:instance-profile/${instance_profile_namespace}/*"
  58. },
  59. {
  60. "Sid": "IamListActions",
  61. "Effect": "Allow",
  62. "Action": [
  63. "iam:ListInstanceProfilesForRole",
  64. "iam:ListPolicies",
  65. "iam:ListPolicyVersions",
  66. "iam:ListEntitiesForPolicy",
  67. "iam:ListRolePolicies",
  68. "iam:ListAttachedRolePolicies"
  69. ],
  70. "Resource": "*"
  71. },
  72. {
  73. "Sid": "NoBoundaryPolicyEdit",
  74. "Effect": "Deny",
  75. "Action": [
  76. "iam:CreatePolicyVersion",
  77. "iam:DeletePolicy",
  78. "iam:DeletePolicyVersion",
  79. "iam:SetDefaultPolicyVersion"
  80. ],
  81. "Resource": "arn:${aws_partition}:iam::${account_id}:policy/${boundary_namespace}/*"
  82. },
  83. {
  84. "Sid": "Services",
  85. "Effect": "Allow",
  86. "Action": [
  87. "s3:*",
  88. "ec2:*",
  89. "events:*",
  90. "logs:*",
  91. "lambda:*",
  92. "sqs:*",
  93. "ssm:*",
  94. "apigateway:*",
  95. "resource-groups:*",
  96. "kms:*"
  97. ],
  98. "Resource": "*"
  99. }
  100. ]
  101. }