Skip to content

Instantly share code, notes, and snippets.

@kmcquade
Last active December 2, 2021 20:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save kmcquade/3161a6737285dc0508a9fa3446e22090 to your computer and use it in GitHub Desktop.
Save kmcquade/3161a6737285dc0508a9fa3446e22090 to your computer and use it in GitHub Desktop.

IAM Actions that can expose resources via Resource Based Policies

ACM Private CAs:

CloudWatch Logs:

  • logs:PutResourcePolicy: Creates or updates a resource policy allowing other AWS services to put log events to this account
  • logs:DeleteResourcePolicy: Deletes a resource policy from this account. This revokes the access of the identities in that policy to put log events to this account.

Elastic Container Registry (ECR):

Elastic File System (EFS):

  • elasticfilesystem:PutFileSystemPolicy: Grants permission to apply a resource-level policy that defines the actions allowed or denied from given actors for the specified file system
  • es:UpdateElasticsearchDomainConfig: Grants permission to modify the configuration of an Amazon ES domain, which includes the Resource-Based Policy (RBP) content. The RBP can be modified to allow access from external IAM principals or from the internet.

Glacier Vault:

IAM Roles:

KMS Keys:

  • kms:PutKeyPolicy: Controls permission to replace the key policy for the specified customer master key

Lambda Functions:

  • lambda:AddPermission: Grants permission to give an AWS service or another account permission to use an AWS Lambda function
  • lambda:RemovePermission: Grants permission to revoke function-use permission from an AWS service or another account

Lambda Layers:

S3 Buckets:

Secrets Manager Secrets:

SES Authorized Senders:

SNS Topics:

  • sns:AddPermission: Adds a statement to a topic's access control policy, granting access for the specified AWS accounts to the specified actions.
  • sns:RemovePermission: Removes a statement from a topic's access control policy.

SQS Queues:

  • sqs:AddPermission: Adds a permission to a queue for a specific principal.
  • sqs:RemovePermission: Revokes any permissions in the queue policy that matches the specified Label parameter.

IAM Actions that can expose resources via Sharing APIs

EBS Snapshots:

EC2 AMIs:

RDS Snapshots:

  • rds:ModifyDBSnapshotAttribute: Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB snapshot. This includes the ability to share snapshots with other AWS Accounts.
  • rds:ModifyDBClusterSnapshotAttribute: Grants permission to add an attribute and values to, or removes an attribute and values from, a manual DB cluster snapshot. This includes the ability to share snapshots with other AWS Accounts.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment