Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS provider tag actions not tracked #70

Open
chrodriguez opened this issue Nov 7, 2023 · 1 comment
Open

AWS provider tag actions not tracked #70

chrodriguez opened this issue Nov 7, 2023 · 1 comment

Comments

@chrodriguez
Copy link

Hi, first of all, I need to say this project is awesome! I've always wondered how to solve writing least privilege policies until I met iamlive. Thank's for writing this useful tool.

I've been working in many scenarios tracking policies within AWS, while running terraform. All actions are correctly tracked but when I've assumed a role with generated policy, I've always get errors when trying to tag objects. No matter which object is tagged, this actions seems to not been tracked. For example, creating a role using terraform using this resorce:

resource "aws_iam_role" "xxxxxx" {
  name  = "SomeRole"

  assume_role_policy = jsonencode({
    Version = "2012-10-17"
    Statement = [
      {.... },
    ]
  })

  tags = {
    Name = "SomeRoleTag"
  }
}

when run using terraform, iam:TagRole action is not tracked.

Thanks in advance

@iann0036
Copy link
Owner

iann0036 commented Nov 7, 2023

Hey @chrodriguez,

Thanks for raising!

This is certainly a dataset issue, specifically that the tagging permission is conditional on the presence of fields which needs some pretty detailed analysis that's not yet done. I've defined the structure for this but am yet to write up the full mappings.

It's coming, but fair warning it'll take some time. You'll unfortunately need to tweak your output policy manually in the interim.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants