-
-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add source_account argument to lambda_permissions in s3_notification_module #134
Comments
+1 |
Good point. Pull request with added |
@antonbabenko Yep, sure. I'll do it immediately. |
|
You should fork this repo and submit a PR to this repo. |
@antonbabenko Thanks, guru! For the quick response. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a new offering from AWS?
Is your request related to a problem? Please describe.
When I enable security hub one I have one critical rule which have description - "You should ensure that access to the Lambda function is restricted to authorized principals only by using least privilege Lambda resource-based policies". Solve this problem it's add this string to lambda permission, but in module you don't have an attribute [source_account] for lamba permissions.
{
"StringEquals": {
"AWS:SourceAccount": "[account_id]"
},
Describe the solution you'd like.
Add source_account attribute
Describe alternatives you've considered.
Additional context
The text was updated successfully, but these errors were encountered: