Skip to content

Commit

Permalink
Change to kms policy rather than adding to role
Browse files Browse the repository at this point in the history
  • Loading branch information
markgov committed Sep 6, 2024
1 parent 4903476 commit 576e228
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 16 deletions.
15 changes: 0 additions & 15 deletions terraform/environments/bootstrap/single-sign-on/policies.tf
Original file line number Diff line number Diff line change
Expand Up @@ -295,21 +295,6 @@ data "aws_iam_policy_document" "developer_additional" {
resources = ["arn:aws:sns:*:*:Automation*"]
}

statement {
sid = "sesAllow"
effect = "Allow"
principals {
type = "Service"
identifiers = ["ses.amazonaws.com"]
}
actions = [
"kms:GenerateDataKey",
"kms:Decrypt"
]
resources = ["*"]

}

statement {
sid = "lambdaAllow"
effect = "Allow"
Expand Down
5 changes: 4 additions & 1 deletion terraform/modules/kms/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,10 @@ data "aws_iam_policy_document" "kms-general" {

principals {
type = "Service"
identifiers = ["cloudwatch.amazonaws.com"]
identifiers = [
"cloudwatch.amazonaws.com",
"ses.amazonaws.com"
]
}
}
}
Expand Down

0 comments on commit 576e228

Please sign in to comment.