Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restricting creating Permission Sets without attaching the Permission Boundary for the same. #115

Open
aritraplaygroundtech opened this issue Mar 16, 2023 · 1 comment

Comments

@aritraplaygroundtech
Copy link

I have a use case from a bigger enterprise, they are currently adopting AWS SSO with AzureAD integration. In the setup, currently account users or roles can create permissionsets with administrator access without adding Permission boundary.

The Permission Boundary policy is created for the AWS account. While manually adding the permission sets from the console and creating a new permission set, it works smoothly. Creating the permission sets without attaching permission boundary works as well. But, to be able to restrict creating the permissionsets does not seem to work by adding a Deny policy on the IAM role/user

{
           "Sid": "DenyCreatePermissionSetWithoutBoundary",
           "Effect": "Deny",
           "Action": [
               "sso:AttachManagedPolicyToPermissionSet",
               "sso:CreateAccountAssignment",
               "sso:CreatePermissionSet",
               "sso:DeleteAccountAssignment",
               "sso:DeleteInlinePolicyFromPermissionSet",
               "sso:DeletePermissionSet",
               "sso:DetachManagedPolicyFromPermissionSet",
               "sso:ProvisionPermissionSet",
               "sso:PutInlinePolicyToPermissionSet",
               "sso:UpdatePermissionSet"
           ],
           "Resource": "*",
           "Condition": {
               "StringNotEquals": {
                   "iam:PermissionsBoundary": "ARN of the PB"
               }
           }
       }

It seems the condition block is not getting evaluated for the above policy. Its either restricting the permission set overall or not restricting at all.

Is there any way to restrict creating the permission sets without adding Permission boundary?

@mdgm88
Copy link

mdgm88 commented Mar 16, 2024

Being able to restrict creation, update etc. of permission sets depending on whether a Permissions Boundary is attached would be a great improvement.

iam:PermissionsBoundary is a condition for IAM roles, not for SSO Permission Sets.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants