Skip to content

Commit

Permalink
[SSPROD-40007] Adding necessary permissions for CFT serverless scanni…
Browse files Browse the repository at this point in the history
…ng (#118)
  • Loading branch information
miguelpais authored May 2, 2024
1 parent 20f2d71 commit cee7459
Show file tree
Hide file tree
Showing 6 changed files with 27 additions and 0 deletions.
3 changes: 3 additions & 0 deletions templates_cspm/CloudAgentlessRole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"

Outputs:
RoleARN:
Expand Down
6 changes: 6 additions & 0 deletions templates_cspm/OrgCloudAgentlessRole.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
RoleStackSet:
Type: AWS::CloudFormation::StackSet
Properties:
Expand Down Expand Up @@ -138,3 +141,6 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
3 changes: 3 additions & 0 deletions templates_cspm_cloudlogs/FullInstall.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
CloudLogsRole:
Type: "AWS::IAM::Role"
Properties:
Expand Down
6 changes: 6 additions & 0 deletions templates_cspm_cloudlogs/OrgFullInstall.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -83,6 +83,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
CloudLogsRole:
Type: "AWS::IAM::Role"
Properties:
Expand Down Expand Up @@ -192,3 +195,6 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
3 changes: 3 additions & 0 deletions templates_cspm_eventbridge/FullInstall.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
EventBridgeRole:
Type: AWS::IAM::Role
Properties:
Expand Down
6 changes: 6 additions & 0 deletions templates_cspm_eventbridge/OrgFullInstall.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -134,6 +134,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
EventBridgeRole:
Type: AWS::IAM::Role
Properties:
Expand Down Expand Up @@ -247,6 +250,9 @@ Resources:
- Effect: "Allow"
Action: "macie2:ListClassificationJobs"
Resource: "*"
- Effect: "Allow"
Action: "lambda:GetRuntimeManagementConfig"
Resource: "*"
EventBridgeRole:
Type: AWS::IAM::Role
Properties:
Expand Down

0 comments on commit cee7459

Please sign in to comment.