Skip to content

Commit 99a4a8c

Browse files
committed
Allow access to DB KMS key
* Now that the DB uses a custom KMS key, the role for deploying data replication resources needs access to this key. * To keep the restrictions restrictive, any actions that would disable the key are still denied
1 parent 56df2b6 commit 99a4a8c

1 file changed

Lines changed: 12 additions & 1 deletion

File tree

terraform/account/resources/iam_policy_DeployDataReplicationResources.json

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,8 @@
2222
"Action": ["*"],
2323
"NotResource": [
2424
"arn:aws:s3:::nhse-mavis-terraform-state-production",
25-
"arn:aws:s3:::nhse-mavis-terraform-state"
25+
"arn:aws:s3:::nhse-mavis-terraform-state",
26+
"arn:aws:kms:eu-west-2:*:key/*"
2627
],
2728
"Condition": {
2829
"StringEquals": {
@@ -38,6 +39,16 @@
3839
}
3940
}
4041
},
42+
{
43+
"Effect": "Deny",
44+
"Action": [
45+
"kms:Delete*",
46+
"kms:ScheduleKeyDeletion",
47+
"kms:Revoke*",
48+
"kms:Disable*"
49+
],
50+
"Resource": "*"
51+
},
4152
{
4253
"Effect": "Allow",
4354
"Action": [

0 commit comments

Comments
 (0)