-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
pipelines: default behavior created overly permissive policy #30598
Comments
@andreprawira , thanks for reporting this. Default role is created by CDK to assume to initiate a deployment in this environment- Code ref - and which adds the KMS:Decrypt policy. |
@khushail how do i bypass it in cdk? |
This role seems to be the
Can you confirm if it's the role you mentioned? |
What’s happening for x-account deployment pipeline:
|
@pahud its not that role, its the role that is created by CDK in account B (Where we deploy the actual resources, not the pipeline, the pipeline is in account A), in my end the role name is
that inline rule is what triggers securityhub findings |
Hi, The Per How does bootstrapping work:
My questions:
You can use AWS CLI to check that as well. From Account B: aws cloudformation list-stack-resources \
--stack-name CDKToolkit \
--query 'StackResourceSummaries[?ResourceType==`AWS::IAM::Role`].[ResourceType, PhysicalResourceId]' \
--output text You should see this
They are the IAM roles created when you |
This issue has not received a response in a while. If you want to keep this issue open, please leave a comment below and auto-close will be canceled. |
Comments on closed issues and PRs are hard for our team to see. If you need help, please open a new issue that references this one. |
Describe the bug
im using the pipelines construct to deploy resources cross account through the pipelines. When the pipeline kicks in, it will create 2 roles (1 in the account where the pipeline is created, and another 1 in the account where we deploy the resources), one of the resources the pipeline deploy is an IAM role named
xxxxx-deploy-role-<account-id>-<region->
that has an inline policy nameddefault
this is what is inside the
default
inline policy (along with other stuff)The problem of this policy is that it creates a problem in our SecurityHub findings
My question is, is there a way to make this policy not overly permissive instead of supressing the finding in the SecurityHub? Or other alternatives that i cant think of? Thx
Expected Behavior
The
default
inline policy isnt overly permissiveCurrent Behavior
The overly permissive
default
inline policy is found to be a problem in SecurityHub findingsReproduction Steps
please view the description above
Possible Solution
No response
Additional Information/Context
No response
CDK CLI Version
2.143.0
Framework Version
No response
Node.js Version
20.13.0
OS
windows
Language
Python
Language Version
3.9.16
Other information
No response
The text was updated successfully, but these errors were encountered: