-
Epic
-
Resolution: Unresolved
-
Critical
-
None
-
None
-
Limit Scope of AWS IAM Permissions Generated by Cloud-Credential-Operator
-
BU Product Work
-
False
-
False
-
Not Selected
-
To Do
-
OCPSTRAT-788 - Improve Cloud Credentials Operator (CCO) and Hive security posture
-
Impediment
-
OCPSTRAT-788Improve Cloud Credentials Operator (CCO) and Hive security posture
-
93% To Do, 0% In Progress, 7% Done
-
M
1. Proposed title of this feature request
Limit Scope of AWS IAM Permissions Generated by Cloud-Credential-Operator.
2. What is the nature and description of the request?
Please review the current IAM permissions provided by the CCO to meet the minimal requirements for running OpenShift.
For example, the IAM user for the `aws-ebs-csi-driver-operator` has the following permissions provided:
~~~
{
"Version": "2012-10-17",
"Statement": [
,
{ "Effect": "Allow", "Action": [ "iam:GetUser" ], "Resource": "arn:aws:iam::326747146819:user/yuzu-x428b-aws-ebs-csi-driver-operator-cbnjk" } ]
}
~~~
The request is, where possible, to add the "aws:SourceVpc" permission limitations that force credentials to be used just from inside the VPC.
3. Why does the customer need this? (List the business requirements here)
Security concerns about the scope of permissions provided by the CCO
4. List any affected packages or components.
CloudCredentialOperator
- blocks
-
RFE-2237 Limit Scope of AWS IAM Permissions Generated by Cloud-Credential-Operator
- Accepted