Open mrlikl opened 2 months ago
Maybe your use case is solved by using Effect: Deny
on the cloudformation:CreateUploadBucket
action
Here's information from the docs
Actions | Description | Access level | Resource types (*required) | Condition keys | Dependent actions | |
---|---|---|---|---|---|---|
CreateUploadBucket [permission only] | Grants permission to upload templates to Amazon S3 buckets. Used only by the AWS CloudFormation console and is not documented in the API reference | Write |
https://docs.aws.amazon.com/service-authorization/latest/reference/list_awscloudformation.html
Users who use the CloudFormation console require additional permissions that aren't required for using the AWS Command Line Interface or CloudFormation APIs. Compared to the AWS CLI and API, the console provides additional features that require additional permissions, such as template uploads to Amazon S3 buckets and drop-down lists for AWS-specific parameter types.
For all the following actions, grant permissions to all resources; don't limit actions to specific stacks or buckets.
The following required action is used only by the CloudFormation console and is not documented in the API reference. The action allows users to upload templates to Amazon S3 buckets.
cloudformation:CreateUploadBucket
Name of the resource
Other
Resource name
No response
Description
The feature request is to
Other Details
No response