You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 10, 2023. It is now read-only.
Today just noticed that if someone creates a new IAM user or IAM role and specifies permission boundaries policy during the role/user creation (for example, via creation wizard) and this policy is AWS-managed, Lambda function will not be able to update this policy to be equal to our "correct" policy and fail.
After that IAM user/role's permission boundaries policy will remain the same as specified in a creation request and "correct" policy will not be enforced.
It's needed to manually change policy for each "broken" user/role.
Today just noticed that if someone creates a new IAM user or IAM role and specifies permission boundaries policy during the role/user creation (for example, via creation wizard) and this policy is AWS-managed, Lambda function will not be able to update this policy to be equal to our "correct" policy and fail.
After that IAM user/role's permission boundaries policy will remain the same as specified in a creation request and "correct" policy will not be enforced.
It's needed to manually change policy for each "broken" user/role.
Please see the code here: https://github.com/aws-samples/scp-alternative-solution/blob/main/lambda/scp-iam-event-dispatcher.py#L430
The text was updated successfully, but these errors were encountered: