Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhance the IAM Policy Permissions for Auto Scaling #24

Open
migara opened this issue Mar 28, 2024 · 1 comment
Open

Enhance the IAM Policy Permissions for Auto Scaling #24

migara opened this issue Mar 28, 2024 · 1 comment
Assignees
Labels

Comments

@migara
Copy link
Member

migara commented Mar 28, 2024

The current lambda function used for auto scaling is attached with an IAM policy which is not constrained to specific resources. The intention of this effort is to check if we can tighten the policy based on resource tags

#8 (review)

Example

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "ec2:StartInstances",
                "ec2:StopInstances"
            ],
            "Resource": "arn:aws:ec2:*:*:instance/*",
            "Condition": {
                "StringEquals": {"aws:ResourceTag/Owner": "${aws:username}"}
            }
        },
        {
            "Effect": "Allow",
            "Action": "ec2:DescribeInstances",
            "Resource": "*"
        }
    ]
}
@migara
Copy link
Member Author

migara commented Jun 27, 2024

The plan is to restrict the resource access to something more specific

@github-actions github-actions bot removed the stale label Jun 28, 2024
@github-actions github-actions bot added the stale label Jul 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants