Skip to content

Feature proposal : restrict permission of state machine IAM role to only functions in the definition #134

@theburningmonk

Description

@theburningmonk

This is a Feature Proposal

Description

Right now the generated IAM role for the state machine is permitted to invoke ALL functions. Should one of the functions used in the step function be compromised, and allowed attacker to gain access to its temp AWS credentials, the attacker would have the permission to execute any and every function in the whole account.

Instead, we should parse the step function definition, pick out the ARN for tasks, and the generated IAM role should be permitted to invoke only those ARNs.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions