aws-policies

How to define a policy/role/permission in AWS which only allows to create stack with a predefined template

怎甘沉沦 提交于 2020-06-29 03:35:28
问题 Is there a way to define a permission/policy/role in AWS which allows to create a CloudFormation Stack using only a specific template (which is updated on S3)? I've seen AWS Service Roles but I think it's not what I'm looking for. In fact I don't see which is the benefit (in terms of security) of using it. If a user can not create a resource directly, but the same user can create the resource through the CloudFormation where is the benefit? However, if there were a way to limit the templates

Is aws:SourceVpc condition key present in the request context when interacting with S3 over web console?

巧了我就是萌 提交于 2020-05-24 03:58:08
问题 I have a Bucket Policy (listed below) that is supposed to prevent access to an S3 bucket when accessed from anywhere other than a specific VPC. I launched an EC2 instance in the VPC, tested and confirmed that S3 access works fine. Now, when I access the same S3 bucket over web console, I get 'Error - Access Denied' message. Does this mean that aws:SourceVpc condition key is present in the request context when interacting with S3 over web console as well? My assumption is that it is present in

Is aws:SourceVpc condition key present in the request context when interacting with S3 over web console?

我与影子孤独终老i 提交于 2020-05-24 03:58:05
问题 I have a Bucket Policy (listed below) that is supposed to prevent access to an S3 bucket when accessed from anywhere other than a specific VPC. I launched an EC2 instance in the VPC, tested and confirmed that S3 access works fine. Now, when I access the same S3 bucket over web console, I get 'Error - Access Denied' message. Does this mean that aws:SourceVpc condition key is present in the request context when interacting with S3 over web console as well? My assumption is that it is present in

AWS IoT - AMQJS0008I Socket closed - AUTHORIZATION_FAILURE

こ雲淡風輕ζ 提交于 2020-05-01 09:46:27
问题 I am trying to configure AWS IoT to use with AWS Amplify. I always see error as " AMQJS0008I Socket closed. ” and CloudWatch says “ AUTHORIZATION_FAILURE ”. This is what I configured I AM policy for authenticated Cognito Identity Pool { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "cognito-identity:*", "mobileanalytics:PutEvents", "cognito-sync:*", "iot:Connect", "iot:Publish", "iot:Subscribe", "iot:Receive", "iot:GetThingShadow", "iot