Skip to content
This repository has been archived by the owner on Jul 31, 2020. It is now read-only.

Releases: trussworks/terraform-aws-org-scp

Confirmed fix for v1.6.3

07 May 20:37
fcba219
Compare
Choose a tag to compare

So, the fix implemented in v1.6.3 didn't actually work -- we've added some switches for the protect-iam-role resources to make sure it actually works properly. This has been more thoroughly tested and now works with both cases.

Fixing empty protect_iam_role_target_ids default

07 May 15:48
627a6bb
Compare
Choose a tag to compare

v1.5.0 introduced a bug for using the module with no target IDs specified for the protect_iam_role SCP; this fixes the default to get rid of a nonbreaking error that this would cause.

Another bugfix for region restriction

06 May 16:42
8a73772
Compare
Choose a tag to compare

Fixing more region restriction code.

Region restriction bugfix

06 May 16:11
436774c
Compare
Choose a tag to compare

There was a broken component of the region restriction SCP; this fixes that bug. Also updated README with an example.

Region restriction SCP

05 May 17:58
bd5d8c6
Compare
Choose a tag to compare

This release adds an SCP that prevents the execution of AWS operations outside a list of approved regions.

Single policy for protect_iam_role in organization

30 Mar 20:15
9d25109
Compare
Choose a tag to compare
Merge pull request #9 from mjuarez/role-attachments

Single policy for protect_iam_role in organization

SCPs protecting sensitive IAM roles and S3 buckets

09 Mar 21:00
6712406
Compare
Choose a tag to compare
Merge pull request #8 from trussworks/mk-protect

SCPs to protect IAM roles and S3 buckets

Fixing reference to the policy document

04 Mar 00:36
56f25b8
Compare
Choose a tag to compare

previously was only referencing the policy object

Minor fix to policy attatchment of deleting_cloudwatch_logs

04 Mar 00:29
d4f486a
Compare
Choose a tag to compare

fixes issue with element selection from target_ids

Adds a policy to restrict deletion of Cloudwatch resources

04 Mar 00:11
6e0223f
Compare
Choose a tag to compare

Adds a policy that denies VPC flow log deletion, deleting Cloudwatch log groups, and deleting Cloudwatch log streams.