Skip to content

IAM Role is given superuser permissions #1

@brianholcomb

Description

@brianholcomb

It's currently:

    "RolePolicies": {
      "Type": "AWS::IAM::Policy",
      "Properties": {
        "PolicyName": "elasticsearch",
        "PolicyDocument": {
          "Statement": [ {
            "Effect": "Allow",
            "Action": "*",
            "Resource": "*"
          } ]
        },
        "Roles": [ { "Ref": "ElasticsearchRole" } ]
      }
    },

this will give the elasticsearch instances full access to the AWS account. The statement could be further restricted:

  "Statement": [
    {
      "Effect": "Allow",
      "Action": "EC2:Describe*",
      "Resource": "*"
    }
  ]

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions