-
Notifications
You must be signed in to change notification settings - Fork 11
/
Copy pathpanther-stackset-execution-role.yml
51 lines (48 loc) · 1.65 KB
/
panther-stackset-execution-role.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# Copyright (C) 2022 Panther Labs, Inc.
#
# The Panther SaaS is licensed under the terms of the Panther Enterprise Subscription
# Agreement available at https://panther.com/enterprise-subscription-agreement/.
# All intellectual property rights in and to the Panther SaaS, including any and all
# rights to access the Panther SaaS, are governed by the Panther Enterprise Subscription Agreement.
AWSTemplateFormatVersion: 2010-09-09
Description: IAM roles for an account being scanned by Panther.
Parameters:
MasterAccountId:
Type: String
Default: ''
MasterAccountRegion:
Type: String
Default: ''
Resources:
CloudFormationStackSetExecutionRole:
Type: AWS::IAM::Role
Properties:
RoleName: !Sub PantherCloudFormationStackSetExecutionRole-${MasterAccountRegion}
Description: CloudFormation assumes this role to execute a stack set
AssumeRolePolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Principal:
AWS: !Sub arn:${AWS::Partition}:iam::${MasterAccountId}:root
Action: sts:AssumeRole
Policies:
- PolicyName: ManageCloudFormationStack
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action: cloudformation:*
Resource: '*'
- PolicyName: PantherSetupRealTimeEvents
PolicyDocument:
Version: 2012-10-17
Statement:
- Effect: Allow
Action:
- events:*
- sns:*
Resource: '*'
Tags:
- Key: panther:app
Value: panther