Open TryTryAgain opened 3 years ago
Shameless plug, but if you're trying to create safe read-only policies you may want to look at my library aws-iam-utils which uses policyuniverse
under the hood. It builds policies from the ground up based on access level (read, list etc) and where specified tries to use wildcards in the result to keep policies short.
It doesn't do removal of specific actions, to cater to your requirement around risky ones, but if needed I can see how that could be implemented with not much code. I suggest you raise an issue in that repo if that's something you need to do.
There's a CLI and YAML-driven counterpart, aws-policy-generator.
As brought up https://github.com/Netflix-Skunkworks/policyuniverse/issues/38#issuecomment-868751613 ... it would be pretty handy if cloudsplaining could help with that by considering adding a
minimize-policy
to accompany the existingexpand-policy
(which I am happy to learn exists).A few thoughts:
1) Like policyuniverse, I'd expect it to take the input policy into account in as much that it would determine the given actions/permissions and read/list/write/tag scope and stick with that? Meaning it wouldn't purely be doing pattern recognition wildcard replacement based on the given strings but take the related permissions potentially not included in the input policy into account; so there wouldn't be unintended permissions granted by mistake. That may be a given but I thought it should be said anyways.
2) Maybe kind of a feature request/enhancement to the existing
expand-policy
functionality as well... it would be cool if the resulting policies could be auto split to work within the constraints of AWS's various policy character limits.What originally sparked my curiosity in this area was to build a "Safer" ReadOnlyAccess policy. I believe @kmcquade you've thought about similar things at length. I'm curious about the best approaches. I understand this is off-topic to the OP/issue.
And some ugly attempts at minizing that using policyuniverse:
vs. simply getting the output of cloudsplaining and adding it to a Deny statement I started questioning my approach.