Skip to content

Commit

Permalink
attaching ssm readonly iam policy in place of ssm full access iam pol…
Browse files Browse the repository at this point in the history
…icy as we should not be granting full access
  • Loading branch information
asifamirat00 committed May 29, 2024
1 parent e90c407 commit 3c57376
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion modules/admin/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ data "aws_iam_policy_document" "assume_role_policy" {
resource "aws_iam_role_policy_attachment" "ecs_task_execution_policy_attachment" {
for_each = toset([
"arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy",
"arn:aws:iam::aws:policy/AmazonSSMFullAccess"
"arn:aws:iam::aws:policy/AmazonSSMReadOnlyAccess"
])

role = aws_iam_role.ecs_execution_role.name
Expand Down
2 changes: 1 addition & 1 deletion modules/dns_dhcp_common/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ EOF
resource "aws_iam_role_policy_attachment" "ecs_task_execution_policy_attachment" {
for_each = toset([
"arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy",
"arn:aws:iam::aws:policy/AmazonSSMFullAccess"
"arn:aws:iam::aws:policy/AmazonSSMReadOnlyAccess"
])

role = aws_iam_role.ecs_execution_role.name
Expand Down

0 comments on commit 3c57376

Please sign in to comment.