Skip to content

Commit

Permalink
Move new permissions all into the new policy
Browse files Browse the repository at this point in the history
Updated readme
  • Loading branch information
LMAX-iwnf committed Jan 23, 2025
1 parent 66996df commit 251372a
Show file tree
Hide file tree
Showing 2 changed files with 42 additions and 42 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ Terraform module for configuring an integration with Lacework and AWS for cloud
## Lacework Audit Policy

The Lacework audit policy extends the SecurityAudit policy to facilitate the reading of additional configuration resources.
As of 1/22/2025, we have exceeded the limit of 6144 characters for a single policy, thus every service starting with codeartifact are in a new policy.
As of 1/22/2025, we have exceeded the limit of 6144 characters for a single policy, thus every service starting with KINESISVIDEO are in a new policy: lwaudit-policy-${random_id.uniq.hex}-2025-1
The audit policy is comprised of the following permissions:

| sid | actions | resources |
Expand Down
82 changes: 41 additions & 41 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -241,47 +241,6 @@ data "aws_iam_policy_document" "lacework_audit_policy" {
]
resources = ["*"]
}

statement {
sid = "KINESISVIDEO"
actions = ["kinesisvideo:GetSignalingChannelEndpoint",
"kinesisvideo:GetDataEndpoint",
"kinesisvideo:DescribeImageGenerationConfiguration",
]
resources = ["*"]
}

statement {
sid = "AMP"
actions = ["aps:ListScrapers",
"aps:DescribeScraper",
"aps:ListWorkspaces",
"aps:DescribeAlertManagerDefinition",
"aps:DescribeLoggingConfiguration",
"aps:DescribeWorkspace",
"aps:ListRuleGroupsNamespaces",
"aps:DescribeRuleGroupsNamespace",
"aps:ListTagsForResource",
]
resources = ["*"]
}

statement {
sid = "APPSTREAM"
actions = ["appstream:Describe*",
"appstream:List*",
]
resources = ["*"]
}

statement {
sid = "PERSONALIZE"
actions = ["personalize:Describe*",
"personalize:List*",
"personalize:GetSolutionMetrics",
]
resources = ["*"]
}
}

# AWS iam allows only 6144 characters in a single policy
Expand Down Expand Up @@ -325,6 +284,47 @@ data "aws_iam_policy_document" "lacework_audit_policy_2025_1" {
]
resources = ["*"]
}

statement {
sid = "KINESISVIDEO"
actions = ["kinesisvideo:GetSignalingChannelEndpoint",
"kinesisvideo:GetDataEndpoint",
"kinesisvideo:DescribeImageGenerationConfiguration",
]
resources = ["*"]
}

statement {
sid = "AMP"
actions = ["aps:ListScrapers",
"aps:DescribeScraper",
"aps:ListWorkspaces",
"aps:DescribeAlertManagerDefinition",
"aps:DescribeLoggingConfiguration",
"aps:DescribeWorkspace",
"aps:ListRuleGroupsNamespaces",
"aps:DescribeRuleGroupsNamespace",
"aps:ListTagsForResource",
]
resources = ["*"]
}

statement {
sid = "APPSTREAM"
actions = ["appstream:Describe*",
"appstream:List*",
]
resources = ["*"]
}

statement {
sid = "PERSONALIZE"
actions = ["personalize:Describe*",
"personalize:List*",
"personalize:GetSolutionMetrics",
]
resources = ["*"]
}
}

resource "aws_iam_policy" "lacework_audit_policy" {
Expand Down

0 comments on commit 251372a

Please sign in to comment.