more specific resources in iam policies
This commit is contained in:
@@ -88,7 +88,7 @@ export class ConditionCheckLambdaStack extends cdk.Stack {
|
||||
description: "Execution role for Condition Check Reminder Lambda",
|
||||
});
|
||||
|
||||
// CloudWatch Logs permissions
|
||||
// CloudWatch Logs permissions - scoped to this Lambda's log group
|
||||
lambdaRole.addToPolicy(
|
||||
new iam.PolicyStatement({
|
||||
effect: iam.Effect.ALLOW,
|
||||
@@ -97,16 +97,21 @@ export class ConditionCheckLambdaStack extends cdk.Stack {
|
||||
"logs:CreateLogStream",
|
||||
"logs:PutLogEvents",
|
||||
],
|
||||
resources: ["*"],
|
||||
resources: [
|
||||
`arn:aws:logs:${this.region}:${this.account}:log-group:/aws/lambda/condition-check-reminder-${environment}`,
|
||||
`arn:aws:logs:${this.region}:${this.account}:log-group:/aws/lambda/condition-check-reminder-${environment}:*`,
|
||||
],
|
||||
})
|
||||
);
|
||||
|
||||
// SES permissions for sending emails
|
||||
// SES permissions for sending emails - scoped to verified identity
|
||||
lambdaRole.addToPolicy(
|
||||
new iam.PolicyStatement({
|
||||
effect: iam.Effect.ALLOW,
|
||||
actions: ["ses:SendEmail", "ses:SendRawEmail"],
|
||||
resources: ["*"],
|
||||
resources: [
|
||||
`arn:aws:ses:${this.region}:${this.account}:identity/${sesFromEmail}`,
|
||||
],
|
||||
})
|
||||
);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user