Skip to content

Conversation

@Veetaha
Copy link
Contributor

@Veetaha Veetaha commented Apr 14, 2025

The idea of a permission boundary didn't survive. Some users have their own custom permission boundary requirements, so we can't suggest them to use an addtional permission boundary for AWS Backup EC2 scans, because there can only ever be a single permission boundary on an IAM role. Instead we'll let the users configure the set of permissions for AWS Backup EC2 scans specifically via stack parameters at the stack source code generation time.

Copy link

@vsazhenyuk-softheme vsazhenyuk-softheme left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:(

@Veetaha Veetaha merged commit d1b57b1 into master Apr 14, 2025
20 checks passed
@Veetaha Veetaha deleted the feat/remove-aws-backup-ec2-scan-policy branch April 14, 2025 15:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants