How to limit the permissions AWS IAM RoleA can grant to a role (Role B) it createsHow can I give an AWS IAM user permissions to manage his own security credentials?Is it possible to restrict AWS users/accounts to a specific region?directorylevel permission through amazon IAMHow can I chain AWS IAM AssumeRole API calls?How to get full access to add services in AWS consoleIAM role switching on an EC2 host without using “source_profile”How can I deploy a large application to Lambda using Serverless, bypassing or not reacking CloudFormation resource limitAllow other AWS services to invoke Lambda using IAMWhy does AWS Lambda need to pass ecsTaskExecutionRole to ECS taskShare IAM Policy across accounts in Organizations

How to get the IP of a user who executed a command?

Electric kick drum pedal starts oscillating in such a way that it does not register hits

How to select certain lines (n, n+4, n+8, n+12...) from the file?

Watching the game, having a puzzle

Is there any evidence to support the claim that the United States was "suckered into WW1" by Zionists, made by Benjamin Freedman in his 1961 speech

Which other programming languages apart from Python and predecessor are out there using indentation to define code blocks?

Why do unstable nuclei form?

Pre-1993 comic in which Wolverine's claws were turned to rubber?

The concept of information structure in incomplete information games

How do I compare the result of "1d20+x, with advantage" to "1d20+y, without advantage", assuming x < y?

Why use steam instead of just hot air?

Is it a good idea to copy a trader when investing?

Succinct and gender-neutral Russian word for "writer"

How are one-time password generators like Google Authenticator different from having two passwords?

Why does it take longer to fly from London to Xi'an than to Beijing

Is it nonsense to say B > [A > B]?

How to make a language evolve quickly?

What do "KAL." and "A.S." stand for in this inscription?

Why are parallelograms defined as quadrilaterals? What term would encompass polygons with greater than two parallel pairs?

Company stopped paying my salary. What are my options?

is it permitted to swallow spit on a fast day?

Why do Thanos' punches not kill Captain America or at least cause vital wounds?

Renting a house to a graduate student in my department

Why did Captain America age?



How to limit the permissions AWS IAM RoleA can grant to a role (Role B) it creates


How can I give an AWS IAM user permissions to manage his own security credentials?Is it possible to restrict AWS users/accounts to a specific region?directorylevel permission through amazon IAMHow can I chain AWS IAM AssumeRole API calls?How to get full access to add services in AWS consoleIAM role switching on an EC2 host without using “source_profile”How can I deploy a large application to Lambda using Serverless, bypassing or not reacking CloudFormation resource limitAllow other AWS services to invoke Lambda using IAMWhy does AWS Lambda need to pass ecsTaskExecutionRole to ECS taskShare IAM Policy across accounts in Organizations






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















In order to allow my developers to use the Serverless Framework to deploy new AWS Lambda functions, they have to be able to create roles. I'd like to give them permissions to create roles that can only do a limited number of things. For example s3:, dynamodb:, cloudfront:Update*



But I don't want them (RoleA) to be able to create roles (RoleB) that can do anything with EC2, IAM, etc. How might you limit this permission?










share|improve this question




























    0















    In order to allow my developers to use the Serverless Framework to deploy new AWS Lambda functions, they have to be able to create roles. I'd like to give them permissions to create roles that can only do a limited number of things. For example s3:, dynamodb:, cloudfront:Update*



    But I don't want them (RoleA) to be able to create roles (RoleB) that can do anything with EC2, IAM, etc. How might you limit this permission?










    share|improve this question
























      0












      0








      0








      In order to allow my developers to use the Serverless Framework to deploy new AWS Lambda functions, they have to be able to create roles. I'd like to give them permissions to create roles that can only do a limited number of things. For example s3:, dynamodb:, cloudfront:Update*



      But I don't want them (RoleA) to be able to create roles (RoleB) that can do anything with EC2, IAM, etc. How might you limit this permission?










      share|improve this question














      In order to allow my developers to use the Serverless Framework to deploy new AWS Lambda functions, they have to be able to create roles. I'd like to give them permissions to create roles that can only do a limited number of things. For example s3:, dynamodb:, cloudfront:Update*



      But I don't want them (RoleA) to be able to create roles (RoleB) that can do anything with EC2, IAM, etc. How might you limit this permission?







      amazon-web-services permissions amazon-iam






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Apr 30 at 17:45









      Bruno BronoskyBruno Bronosky

      3,78121627




      3,78121627




















          1 Answer
          1






          active

          oldest

          votes


















          0














          I also had the same problem; the only solution I found was to create the role to be used with Lambdas before they actually made the deployment, and provide them the Role ARN to be passed to Serverless for the Lambda deployment.



          In this way, they always used the same role(s) I gave them, and on the roles I attached custom policies with only the required permission for the Lambdas to work.



          You only need to grant their user permission to list and attach roles if I remember correctly, instead of the CreateRole one.






          share|improve this answer























          • Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

            – Bruno Bronosky
            May 3 at 8:57











          • Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

            – Lorenz_DR
            2 days ago











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965306%2fhow-to-limit-the-permissions-aws-iam-rolea-can-grant-to-a-role-role-b-it-creat%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          0














          I also had the same problem; the only solution I found was to create the role to be used with Lambdas before they actually made the deployment, and provide them the Role ARN to be passed to Serverless for the Lambda deployment.



          In this way, they always used the same role(s) I gave them, and on the roles I attached custom policies with only the required permission for the Lambdas to work.



          You only need to grant their user permission to list and attach roles if I remember correctly, instead of the CreateRole one.






          share|improve this answer























          • Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

            – Bruno Bronosky
            May 3 at 8:57











          • Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

            – Lorenz_DR
            2 days ago















          0














          I also had the same problem; the only solution I found was to create the role to be used with Lambdas before they actually made the deployment, and provide them the Role ARN to be passed to Serverless for the Lambda deployment.



          In this way, they always used the same role(s) I gave them, and on the roles I attached custom policies with only the required permission for the Lambdas to work.



          You only need to grant their user permission to list and attach roles if I remember correctly, instead of the CreateRole one.






          share|improve this answer























          • Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

            – Bruno Bronosky
            May 3 at 8:57











          • Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

            – Lorenz_DR
            2 days ago













          0












          0








          0







          I also had the same problem; the only solution I found was to create the role to be used with Lambdas before they actually made the deployment, and provide them the Role ARN to be passed to Serverless for the Lambda deployment.



          In this way, they always used the same role(s) I gave them, and on the roles I attached custom policies with only the required permission for the Lambdas to work.



          You only need to grant their user permission to list and attach roles if I remember correctly, instead of the CreateRole one.






          share|improve this answer













          I also had the same problem; the only solution I found was to create the role to be used with Lambdas before they actually made the deployment, and provide them the Role ARN to be passed to Serverless for the Lambda deployment.



          In this way, they always used the same role(s) I gave them, and on the roles I attached custom policies with only the required permission for the Lambdas to work.



          You only need to grant their user permission to list and attach roles if I remember correctly, instead of the CreateRole one.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered May 3 at 8:34









          Lorenz_DRLorenz_DR

          263




          263












          • Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

            – Bruno Bronosky
            May 3 at 8:57











          • Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

            – Lorenz_DR
            2 days ago

















          • Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

            – Bruno Bronosky
            May 3 at 8:57











          • Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

            – Lorenz_DR
            2 days ago
















          Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

          – Bruno Bronosky
          May 3 at 8:57





          Thank you for this. This is the kind of solution I was going for but didn't know how to implement. I considered creating a single role that all developers would give their Lambdas initially and I would replace the role later with a custom limited one. I would much rather allow them to create a custom role but limit them to attaching a single policy which I would later replace.

          – Bruno Bronosky
          May 3 at 8:57













          Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

          – Lorenz_DR
          2 days ago





          Related to your statement "single role that all developers would give their Lambdas", this means having one single role being used from all functions which, depending on the function, may end granting more permissions than needed. The best practice would tell you to create one role for each Lamdba function, or at least differentiate between roles if they need different permissions policy-wise. Eg: if all your Lambdas only need to access one particular S3 bucket, then it may make sense to have only one role and one policy, otherwise it would go against the Least Privileged Access guideline

          – Lorenz_DR
          2 days ago

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965306%2fhow-to-limit-the-permissions-aws-iam-rolea-can-grant-to-a-role-role-b-it-creat%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020