Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add IAM conditionals to s3 bucket policy (aws:SourceARN, aws:SourceAccount, etc) #279

Closed
aiell0 opened this issue Apr 19, 2024 · 2 comments
Labels

Comments

@aiell0
Copy link
Contributor

aiell0 commented Apr 19, 2024

Describe the solution you'd like.

I would like to be able to add conditional statements to the S3 bucket policy that prevent the confused deputy problem. I would also like it to work alongside the current policy options (alb logging, s3 logging, encryption, etc).

Describe alternatives you've considered.

There aren't any besides creating the policy at a separate resource and linking the s3 bucket created from the module.

Additional context

None

Copy link

This issue has been automatically marked as stale because it has been open 30 days
with no activity. Remove stale label or comment or this issue will be closed in 10 days

@github-actions github-actions bot added the stale label May 20, 2024
Copy link

This issue was automatically closed because of stale in 10 days

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale May 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant