Effect : Deny vs No Action

  • No action allows us to provide granular level control over resources operations.
  • For example, if we use effect, deny For all actions in IAM An, then we use effect allow over some actions in IAM then deniable supersede allow.
  • The way to overcome above issue is to use NoAction on all IAM operations And action on Allowed IAM operations.
  • Example
    • { "Version" : "2012-10-17", "Statement" : [ { "Effect" : "Allow", "NotAction" : [ "iam:*", "organizations:*", "account:*" ], "Resource" : "*" }, { "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole", "iam:DeleteServiceLinkedRole", "iam:ListRoles", "organizations:DescribeOrganization", "account:ListRegions", "account:GetAccountInformation" ], "Resource" : "*" } ] }
  • The above is policy of AWSPowerUserAccess

Comments

Popular posts from this blog

AWS Summaries

Infrastructure Setup using Cloud Formation Templates