role-mdr_engineer_readonly.tf 1.3 KB

1234567891011121314151617181920212223242526272829
  1. #------------------------------------------------------------------------------------------
  2. # A Read Only Engineer. Assumption is this is everyone's normal working
  3. # role day-to-day in the AWS console. When you need it, you then elevate
  4. # to mdr_terraformer.
  5. #
  6. # Note this is NOT JUST READ ONLY ACCESS. This should only be
  7. # assigned to ENGINEERS who you expect will able to make changes
  8. # as needed.
  9. #------------------------------------------------------------------------------------------
  10. module "role-mdr_engineer_readonly" {
  11. source = "./modules/saml_linked_role"
  12. name = "mdr_engineer_readonly"
  13. account_friendly_name = aws_iam_account_alias.alias.account_alias
  14. path = "/user/"
  15. assume_role_policy = data.aws_iam_policy_document.okta_saml_assume_role_policy.json
  16. okta_app_id = data.okta_app.awsapp.id
  17. }
  18. resource "aws_iam_role_policy_attachment" "mdr_engineer_readonly_ViewOnlyAccess" {
  19. role = module.role-mdr_engineer_readonly.name
  20. policy_arn = "arn:${local.aws_partition}:iam::aws:policy/job-function/ViewOnlyAccess"
  21. }
  22. resource "aws_iam_role_policy_attachment" "mdr_engineer_readonly_assumerole" {
  23. role = module.role-mdr_engineer_readonly.name
  24. policy_arn = module.standard_iam_policies.arns["mdr_readonly_assumerole"]
  25. }