Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
CloudFormation Service Role and Policy
---
AWSTemplateFormatVersion: '2010-09-09'
Description: CloudFormation Service Role and Policy
Metadata:
Author: Michael Ludvig
Url: https://aws.nz/best-practice/cloudformation-service-roles/
Parameters:
RoleName:
Description: IAM Role name
Type: String
Default: svcCloudFormation
PolicyName:
Description: IAM Policy name
Type: String
Default: svcCloudFormation
Resources:
CfnServiceRole:
Type: AWS::IAM::Role
Properties:
RoleName: !Ref RoleName
Path: /service/
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
- Action: sts:AssumeRole
Effect: Allow
Principal:
Service: cloudformation.amazonaws.com
ManagedPolicyArns:
- arn:aws:iam::aws:policy/AdministratorAccess
CfnUserPolicy:
Type: AWS::IAM::ManagedPolicy
Properties:
ManagedPolicyName: !Ref PolicyName
Description: User policy for creating CFN stacks with the use of svcCloudFormation role.
Path: /
PolicyDocument:
Version: 2012-10-17
Statement:
- Action:
- iam:PassRole
Effect: Allow
Resource:
- !GetAtt CfnServiceRole.Arn
- Action:
- cloudformation:CreateUploadBucket
- cloudformation:CreateStack
Effect: Allow
Resource: '*'
- Action:
- s3:PutObject
- s3:GetObject
- s3:ListBucket
Effect: Allow
Resource:
- arn:aws:s3:::cf-templates-*
- arn:aws:s3:::cf-templates-*/*
Outputs:
CfnServiceRoleArn:
Value: !GetAtt CfnServiceRole.Arn
CfnUserPolicyArn:
Value: !Ref CfnUserPolicy
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.