You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: iam-roles/cloudformation-management/IDP-Cloudformation-Service-Role.yaml
+2Lines changed: 2 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,8 @@ Resources:
24
24
reason: "Suppressing W76: SPCM for IAM policy document is higher than 25"
25
25
- id: F3
26
26
reason: "Suppressing F3: wildcard action on named services required for cloudformation service role, to allow CRUD on stack respources"
27
+
- id: AwsSolutions-IAM5
28
+
reason: "Broad permissions required for non-admin users to deploy IDP stacks via delegated CloudFormation service role"
27
29
# checkov:skip=CKV_AWS_110: "CloudFormation service role requires IAM permissions to create Lambda execution roles and service-linked roles during stack deployment. Trust policy restricts to cloudformation.amazonaws.com service principal."
28
30
# checkov:skip=CKV_AWS_109: "CloudFormation service role requires IAM policy management permissions to attach policies to created roles during infrastructure deployment. Constrained by trust policy."
29
31
# checkov:skip=CKV_AWS_108: "CloudFormation service role requires S3/KMS permissions to create and configure encrypted data buckets for the IDP solution. All buckets use customer-managed KMS encryption."
result=subprocess.run(cmd, shell=True, cwd=cwd, capture_output=True, text=True)# nosemgrep: python.lang.security.audit.subprocess-shell-true.subprocess-shell-true - command is hardcoded constant from config file, no user input possible
0 commit comments