Skip to content

Commit

Permalink
POL-1337 Fix AWS Untagged Resources README and Policy Permission CFT (#…
Browse files Browse the repository at this point in the history
…2609)

* update

* fix

* update

* fix

* update

* fix

* update

* update

* update
  • Loading branch information
XOmniverse authored Sep 5, 2024
1 parent 798eaad commit a6948c8
Show file tree
Hide file tree
Showing 6 changed files with 1,112 additions and 40 deletions.
1 change: 1 addition & 0 deletions .spellignore
Original file line number Diff line number Diff line change
Expand Up @@ -564,3 +564,4 @@ SCP
USD
EUR
CCO
untagged
8 changes: 1 addition & 7 deletions compliance/aws/untagged_resources/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,12 +48,9 @@ This Policy Template uses [Credentials](https://docs.flexera.com/flexera/EN/Auto

- [**AWS Credential**](https://docs.flexera.com/flexera/EN/Automation/ProviderCredentials.htm#automationadmin_1982464505_1121575) (*provider=aws*) which has the following permissions:
- `sts:GetCallerIdentity`
- `config:TagResource`
- `ec2:DescribeRegions`
- `tag:GetResources`
- `ec2:CreateTags`*
- `tag:TagResources`*
- `rds:AddTagsToResources`*

\* Only required for taking action (adding tags); the policy will still function in a read-only capacity without these permissions.

Expand All @@ -67,12 +64,9 @@ This Policy Template uses [Credentials](https://docs.flexera.com/flexera/EN/Auto
"Effect": "Allow",
"Action": [
"sts:GetCallerIdentity",
"config:TagResource",
"ec2:DescribeRegions",
"tag:GetResources",
"ec2:CreateTags",
"tag:TagResources",
"rds:AddTagsToResource"
"tag:TagResources"
],
"Resource": "*"
}
Expand Down
17 changes: 0 additions & 17 deletions data/policy_permissions_list/master_policy_permissions_list.json
Original file line number Diff line number Diff line change
Expand Up @@ -605,11 +605,6 @@
"read_only": true,
"required": true
},
{
"name": "config:TagResource",
"read_only": true,
"required": true
},
{
"name": "ec2:DescribeRegions",
"read_only": true,
Expand All @@ -620,23 +615,11 @@
"read_only": true,
"required": true
},
{
"name": "ec2:CreateTags",
"read_only": false,
"required": false,
"description": "Only required for taking action (adding tags); the policy will still function in a read-only capacity without these permissions."
},
{
"name": "tag:TagResources",
"read_only": false,
"required": false,
"description": "Only required for taking action (adding tags); the policy will still function in a read-only capacity without these permissions."
},
{
"name": "rds:AddTagsToResources",
"read_only": false,
"required": false,
"description": "Only required for taking action (adding tags); the policy will still function in a read-only capacity without these permissions."
}
]
},
Expand Down
13 changes: 0 additions & 13 deletions data/policy_permissions_list/master_policy_permissions_list.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -349,30 +349,17 @@
- name: sts:GetCallerIdentity
read_only: true
required: true
- name: config:TagResource
read_only: true
required: true
- name: ec2:DescribeRegions
read_only: true
required: true
- name: tag:GetResources
read_only: true
required: true
- name: ec2:CreateTags
read_only: false
required: false
description: Only required for taking action (adding tags); the policy will
still function in a read-only capacity without these permissions.
- name: tag:TagResources
read_only: false
required: false
description: Only required for taking action (adding tags); the policy will
still function in a read-only capacity without these permissions.
- name: rds:AddTagsToResources
read_only: false
required: false
description: Only required for taking action (adding tags); the policy will
still function in a read-only capacity without these permissions.
- :name: flexera
:permissions:
- name: billing_center_viewer
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -534,13 +534,10 @@ Mappings:
AWSUntaggedResources:
read:
- "sts:GetCallerIdentity"
- "config:TagResource"
- "ec2:DescribeRegions"
- "tag:GetResources"
action:
- "ec2:CreateTags"
- "tag:TagResources"
- "rds:AddTagsToResources"
# End for each policy template


Expand Down
Loading

0 comments on commit a6948c8

Please sign in to comment.