Re: IAM permissions adjustment on AWS

2017-08-10 Thread paul
This snippet might be of use. This is what I use on my general 'all-users' group, to keep any users not specified out of my s3 ops bucket with some private keys in it. You specify the blessed users by IAM user ID, and everyone else is denied. I assume you could use a similar pattern on other

Re: IAM permissions adjustment on AWS

2017-08-10 Thread Noah Meyerhans
On Thu, Aug 10, 2017 at 08:28:44AM +0100, kuLa wrote: > I'm recently fiddling a lot with permissions on the Debian AWS account and > it's > been pointed to me that it's worth considering updating IAM settings a bit. > > Having above in mind and that DDs are already trusted enough :-) I'm

Re: IAM permissions adjustment on AWS

2017-08-10 Thread James Bromberger
The only down side of this would be any secrets stored in any SSM Parameter Store locations, but at this point in time I don't think three are any; historically, people would store secrets into S3 buckets (probably client-side encrypted, definitely server side encrypted). These secrets could be

Re: IAM permissions adjustment on AWS

2017-08-10 Thread Bastian Blank
Hi On Thu, Aug 10, 2017 at 08:28:44AM +0100, kuLa wrote: > I'm recently fiddling a lot with permissions on the Debian AWS account and > it's > been pointed to me that it's worth considering updating IAM settings a bit. > Having above in mind and that DDs are already trusted enough :-) I'm

IAM permissions adjustment on AWS

2017-08-10 Thread kuLa
Hi All, I'm recently fiddling a lot with permissions on the Debian AWS account and it's been pointed to me that it's worth considering updating IAM settings a bit. Having above in mind and that DDs are already trusted enough :-) I'm thinking about giving a full RO to all DDs which are having