Skip to content

IAM errors when extending ECS Deploy Runner with AWS Systems Manager permissions #76

Answered by zackproser
zackproser asked this question in Help
Discussion options

You must be logged in to vote

It looks like the allow-ops-admin-access-from-other-accounts role, by default, is configured with the same permissions that our Elastic Deploy Runner in the security account's mgmt folder shows in the deploy_permissions.yml file.

In most cases, this includes KMS:*, which would in turn include actions such as KMS:Decrypt and KMS:Encrypt. Why are the KMS permissions relevant?

In a couple of cases, even if you have sufficient permissions to take an action in IAM, but that action (say, ssm:PutParameter in this case) will end up making use of a KMS key, whether it be customer managed or a default one managed by AWS, then you still need sufficient permissions for that KMS key, too.

Otherwise, y…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by zackproser
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment