You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: service_control_policies/service_specific_controls/README.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,19 +39,19 @@ This policy statement is included in the [network_perimeter_ec2_policy](network_
39
39
40
40
The `ec2:SourceInstanceARN` condition key is used to target role sessions that are created for applications running on your Amazon EC2 instances.
41
41
42
-
### "Sid":"EnforceNetworkPerimeterOnIAMUsers "
42
+
### "Sid":"EnforceNetworkPerimeterOnIAMUsers "
43
43
44
44
This policy statement is included in the [network_perimeter_iam_users_policy](/service_control_policies/service_specific_controls/network_perimeter_iam_users_policy.json) and limits access to expected networks for IAM users. Expected networks are defined as follows:
45
-
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (<my-corporate-cidr>) in the policy statement.
46
-
* Your organization’s VPCs that are specified by VPC IDs (<my-vpc>) in the policy statement.
45
+
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (`<my-corporate-cidr>`) in the policy statement.
46
+
* Your organization’s VPCs that are specified by VPC IDs (`<my-vpc>`) in the policy statement.
47
47
* Networks of AWS services that use [forward access sessions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_forward_access_sessions.html) to access resources on your behalf as denoted by `aws:ViaAWSService` in the policy statement. This access pattern applies when you access data via an AWS service, and that service takes subsequent actions on your behalf by using your IAM credentials.
48
48
49
49
50
50
### "Sid":"EnforceNetworkPerimeterOnLambdaRoles"
51
51
52
52
This policy statement is included in the [network_perimeter_lambda_policy](/service_control_policies/service_specific_controls/network_perimeter_lambda_policy.json) and limits access to expected networks for service roles used by AWS Lambda. Expected networks are defined as follows:
53
-
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (<my-corporate-cidr>) in the policy statement.
54
-
* Your organization’s VPCs that are specified by VPC IDs (<my-vpc>) in the policy statement.
53
+
* Your on-premises data centers and static egress points in AWS such as a NAT gateway that are specified by IP ranges (`<my-corporate-cidr>`) in the policy statement.
54
+
* Your organization’s VPCs that are specified by VPC IDs (`<my-vpc>`) in the policy statement.
55
55
* Networks of AWS services that use [forward access sessions](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_forward_access_sessions.html) to access resources on your behalf as denoted by `aws:ViaAWSService` in the policy statement. This access pattern applies when you access data via an AWS service, and that service takes subsequent actions on your behalf by using your IAM credentials.
56
56
* AWS Lambda networks when the service interacts with [CloudWatch Logs](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html), [AWS X-Ray](https://aws.amazon.com/xray/), and [Amazon EFS](https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/WhatIsCloudWatchLogs.html), as denoted by the `NotAction` element with the actions `xray:PutTraceSegments`,`logs:CreateLogGroup`,`logs:CreateLogStream`,`logs:PutLogEvents`, `elasticfilesystem:ClientMount`.
0 commit comments