diff --git a/templates_cloudlogs/OrgCloudLogs.yaml b/templates_cloudlogs/OrgCloudLogs.yaml index eb1feee..2bf1683 100644 --- a/templates_cloudlogs/OrgCloudLogs.yaml +++ b/templates_cloudlogs/OrgCloudLogs.yaml @@ -13,7 +13,7 @@ Metadata: Parameters: - CSPMRoleName - CloudLogsRoleName - - ExternalId + - ExternalID - TrustedIdentity - BucketARN @@ -22,7 +22,7 @@ Metadata: default: "CSPM Role Name (Sysdig use only)" CloudLogsRoleName: default: "CloudLogs Role Name (Sysdig use only)" - ExternalId: + ExternalID: default: "External ID (Sysdig use only)" TrustedIdentity: default: "Trusted Identity (Sysdig use only)" @@ -36,7 +36,7 @@ Parameters: CloudLogsRoleName: Type: String Description: The name of the IAM Role that will enable access to the Cloudtrail logs. - ExternalId: + ExternalID: Type: String Description: Random string generated unique to a customer. TrustedIdentity: @@ -61,7 +61,7 @@ Resources: - "sts:AssumeRole" Condition: StringEquals: - "sts:ExternalId": !Ref ExternalId + "sts:ExternalId": !Ref ExternalID CloudLogsRolePolicies: Type: "AWS::IAM::Policy" Properties: @@ -92,6 +92,6 @@ Resources: Action: "sts:AssumeRole" Condition: StringEquals: - sts:ExternalId: !Ref ExternalId + sts:ExternalId: !Ref ExternalID ManagedPolicyArns: - arn:aws:iam::aws:policy/SecurityAudit