Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Minimum AWS Policy Template #32

Open
zombietango opened this issue Aug 6, 2019 · 2 comments
Open

Feature Request: Minimum AWS Policy Template #32

zombietango opened this issue Aug 6, 2019 · 2 comments
Labels
enhancement New feature or request

Comments

@zombietango
Copy link

Could you provide a bare minimum IAM security policy file that can be imported into an instance and assigned to the user CloudGoat is running under? I'd rather not create a full administrator user to run this, nor do most of our corporate sandbox instances allow for such a thing anyways. If you know what specific roles/permissions are needed to run the scenarios, that would make deployment much easier. As far as I can see, the only guidance is to grant the ability to create/destroy objects, but that isn't that specific.

Thanks! We are looking forward to using this.

@ghost
Copy link

ghost commented Aug 6, 2019

Hey @zombietango - thanks for reaching out. That's a very solid idea, and your caution in running CloudGoat is commendable!

I can't say when we'll be able to implement this, but I've added it to our internal board of product ideas. I'll also leave this issue open in case someone in the community wants to tackle this on their own.

@ghost ghost changed the title Minimum AWS Policy Template Feature Request: Minimum AWS Policy Template Aug 6, 2019
@ghost ghost added the enhancement New feature or request label Aug 6, 2019
@andrew-aiken
Copy link
Contributor

The tool pike might be able to map some of the permissions out for you.
The issue still remains that for most scenarios we need to create IAM users/roles with custom policies

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants