Skip to content

Commit

Permalink
Add permission for 5 waf-regional APIs
Browse files Browse the repository at this point in the history
  • Loading branch information
jjzhangjjzhang committed Nov 9, 2023
1 parent e947030 commit 2e4822f
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 1 deletion.
7 changes: 6 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -134,4 +134,9 @@ The audit policy is comprised of the following permissions:
| | apigatewayv2:GetRoute | |
| | apigatewayv2:GetRouteResponses | |
| | apigatewayv2:GetStages | |
| | apigatewayv2:GetVpcLinks | |
| | apigatewayv2:GetVpcLinks | |
| WAF-REGIONAL | waf-regional:ListRules | * |
| | waf-regional:GetRule | |
| | waf-regional:ListRuleGroups | |
| | waf-regional:GetRuleGroup | |
| | waf-regional:ListActivatedRuleInRuleGroup | |
10 changes: 10 additions & 0 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -134,6 +134,16 @@ data "aws_iam_policy_document" "lacework_audit_policy" {
"apigatewayv2:GetVpcLinks"]
resources = ["*"]
}
statement {
sid = "WAF-REGIONAL"
actions = ["waf-regional:ListRules",
"waf-regional:GetRule",
"waf-regional:ListRuleGroups",
"waf-regional:GetRuleGroup",
"waf-regional:ListActivatedRuleInRuleGroup"
]
resources = ["*"]
}
}

resource "aws_iam_policy" "lacework_audit_policy" {
Expand Down

0 comments on commit 2e4822f

Please sign in to comment.