Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Added additional conditions into Flow Log IAM Role Assumption Policy #1138

Merged
merged 1 commit into from
Nov 18, 2024

Conversation

fschykowski
Copy link
Contributor

Description

Allows modifications to the assume role policy of the flow log IAM role.

Motivation and Context

The recommended action by AWS to prevent confused deputy attacks is to add sourceArn, sourceAccount or sourceOrg as conditions as condition to the role assumption. https://docs.aws.amazon.com/IAM/latest/UserGuide/confused-deputy.html

Breaking Changes

Should not break anything, as the default variable is empty and will simply not render the dynamic block.

How Has This Been Tested?

  • I have validated locally that the config is rendered correctly from terraform plan for both adding sourceAccount as condition and not adding conditions.
  • I have executed pre-commit run -a on my pull request

@fschykowski fschykowski changed the title Modify Flow Log IAM Role Assumption Policy: additional conditions feat: Flow Log IAM Role Assumption Policy: additional conditions Nov 18, 2024
@antonbabenko antonbabenko changed the title feat: Flow Log IAM Role Assumption Policy: additional conditions feat: Added additional conditions into Flow Log IAM Role Assumption Policy Nov 18, 2024
@antonbabenko antonbabenko merged commit 7744d3f into terraform-aws-modules:master Nov 18, 2024
19 of 20 checks passed
antonbabenko pushed a commit that referenced this pull request Nov 18, 2024
## [5.16.0](v5.15.0...v5.16.0) (2024-11-18)

### Features

* Added additional conditions into Flow Log IAM Role Assumption Policy ([#1138](#1138)) ([7744d3f](7744d3f))
@antonbabenko
Copy link
Member

This PR is included in version 5.16.0 🎉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants