Skip to content

Commit 4da9a3d

Browse files
committed
Added IAM Users long-term credential and Lambda Role policy
1 parent 22593e2 commit 4da9a3d

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

  • service_control_policies/service_specific_controls

service_control_policies/service_specific_controls/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,19 +39,19 @@ This policy statement is included in the [network_perimeter_ec2_policy](network_
3939

4040
The `ec2:SourceInstanceARN` condition key is used to target role sessions that are created for applications running on your Amazon EC2 instances.
4141

42-
### "Sid":" EnforceNetworkPerimeterOnIAMUsers "
42+
### "Sid":"EnforceNetworkPerimeterOnIAMUsers "
4343

4444
This policy statement is included in the [network_perimeter_iam_users_policy](/service_control_policies/service_specific_controls/network_perimeter_iam_users_policy.json) and limits access to expected networks for IAM users. Expected networks are defined as follows:
45-
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (<my-corporate-cidr>) in the policy statement.
46-
* Your organization’s VPCs that are specified by VPC IDs (<my-vpc>) in the policy statement.
45+
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (`<my-corporate-cidr>`) in the policy statement.
46+
* Your organization’s VPCs that are specified by VPC IDs (`<my-vpc>`) in the policy statement.
4747
* Networks of AWS services that use [forward access sessions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_forward_access_sessions.html) to access resources on your behalf as denoted by `aws:ViaAWSService` in the policy statement. This access pattern applies when you access data via an AWS service, and that service takes subsequent actions on your behalf by using your IAM credentials.
4848

4949

5050
### "Sid":"EnforceNetworkPerimeterOnLambdaRoles"
5151

5252
This policy statement is included in the [network_perimeter_lambda_policy](/service_control_policies/service_specific_controls/network_perimeter_lambda_policy.json) and limits access to expected networks for service roles used by AWS Lambda. Expected networks are defined as follows:
53-
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (<my-corporate-cidr>) in the policy statement.
54-
* Your organization’s VPCs that are specified by VPC IDs (<my-vpc>) in the policy statement.
53+
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (`<my-corporate-cidr>`) in the policy statement.
54+
* Your organization’s VPCs that are specified by VPC IDs (`<my-vpc>`) in the policy statement.
5555
* Networks of AWS services that use [forward access sessions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_forward_access_sessions.html) to access resources on your behalf as denoted by `aws:ViaAWSService` in the policy statement. This access pattern applies when you access data via an AWS service, and that service takes subsequent actions on your behalf by using your IAM credentials.
5656
* AWS Lambda networks when the service interacts with [CloudWatch Logs]( https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html), [AWS X-Ray](https://aws.amazon.com/xray/), and [Amazon EFS]( https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html), as denoted by the `NotAction` element with the actions `xray:PutTraceSegments`,`logs:CreateLogGroup`,`logs:CreateLogStream`,`logs:PutLogEvents`, `elasticfilesystem:ClientMount`.
5757

0 commit comments

Comments
 (0)