Project

General

Profile

Actions

Bug #12

open

[SEC] modification policy codepipeline

Added by UserName LastName 10 months ago. Updated 7 months ago.

Status:
In Progress
Priority:
Normal
Assignee:
Start date:
Due date:
% Done:

0%

Estimated time:
(Total: 0:00 h)

Description

Il faudrait modifier la policy de create_ami et deliver_ami pour ne pas autoriser tout les S3

data "aws_iam_policy_document" "codepipeline_policy" {
  statement {
    actions = [
      "s3:*",
      "codecommit:*",
      "codebuild:BatchGetBuilds",
      "codebuild:StartBuild" 
    ]
    resources = [
      "*",
    ]
  }
}

Subtasks 3 (3 open0 closed)

Bug #18: [SEC] Mettre à jour la politique IAM pour restreindre l'accès S3New

Actions
Bug #19: [TEST] Valider la nouvelle politique IAM en environnement de testNew

Actions
Bug #20: [PROD] Déployer la politique IAM sécurisée en productionNew

Actions
Actions #1

Updated by UserName LastName 10 months ago

  • Status changed from New to In Progress
Actions #2

Updated by UserName LastName 10 months ago · Edited

informations :
nom-du-bucket-pour-create-ami = bu-4-create-ami les action autorisée
s3:GetObject, s3:PutObject, s3:ListBucket

Actions #3

Updated by UserName LastName 10 months ago

  • Priority changed from Normal to High
Actions #5

Updated by UserName LastName 10 months ago

Quel est le nom exact du (ou des) bucket(s) S3 utilisé(s) par le pipeline deliver_ami ? mon-bucket
Quelles sont les actions S3 minimales requises pour ce(s) bucket(s) : s3:GetObject, s3:PutObject, s3:ListBucket

Actions #7

Updated by UserName LastName 8 months ago

  • Assignee set to John Doe
Actions #9

Updated by UserName LastName 7 months ago

  • Subtask #18 added
Actions #10

Updated by UserName LastName 7 months ago

  • Subtask #19 added
Actions #11

Updated by UserName LastName 7 months ago

  • Subtask #20 added
Actions

Also available in: Atom PDF