Giter Site home page Giter Site logo

Comments (9)

rix0rrr avatar rix0rrr commented on May 18, 2024

I do have a use case for it right now, which is secrets--definitely only want those to be readable by designated users.

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

I wonder if it's better to strip resource policies out right now, release without them, and tighten up later as people ask for it?

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

This also ties into meeting compliance requirements for service teams/enterprises: customer data should never be accessible by humans, and it's very likely that humans have role access to the account, potentially with ":" policies attached to the role.

Maybe the solution is that we have a boolean to mark certain resources sensitive: true, and that controls whether permissions are role-only or bidi.

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

To make matters worse, IAM policies don't even work how I thought they worked :(

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

I think the logic will have to be:

  • Attach to identity policy; UNLESS
    • that's not possible because of principal type (because the principal is not an IAM Identity. Examples of non-identity principals are Account Root or Service Principal) => attach to resource instead
    • the grant is cross-account => attach to both

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

Soo... S3 policies are definitely additive (as in, you can do the action as long as either the resource policy or IAM policy gives you the permission), but KMS policies seem not to be?

I have an identity that has "*:*" yet I still cannot use the key to decrypt as long as I don't have an explicit resource grant.

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

I guess this makes sense for KMS and it appears to be documented (https://docs.aws.amazon.com/kms/latest/developerguide/determining-access.html) but we now have to contend with that IAM evaluation rules might be different for different resources.

from aws-cdk.

SomayaB avatar SomayaB commented on May 18, 2024

@rix0rrr This is from 2018. Is it still relevant or can we close it?

from aws-cdk.

rix0rrr avatar rix0rrr commented on May 18, 2024

Mmyeah, let's close it.

from aws-cdk.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.