Control: AWS > IAM > Role > Boundary
Configure which boundary policy to apply to the IAM role. This must be the name of an existing AWS IAM Boundary policy.
AWS Boundary Policies are used to enforce Turbot Guardrails for enabling/disabling API Services and Regions.
If set to Check or Enforce per AWS > Turbot > Permissions
(the default), the boundary will be enforced if Turbot > Permissions are enforced, checked if Turbot > Permissions are checked, and skippped if Turbot Permissions are none or skip
Resource Types
This control targets the following resource types:
Policies
The following policies can be used to configure this control:
This control type relies on these other policies when running actions:
- AWS > IAM > Role > Boundary > Policy
- AWS > Turbot > Permissions > Role > Name Path
- AWS > Turbot > Permissions
Permissions
Cloud permissions used by this control and its actions:
iam:PutRolePermissionsBoundary
iam:DeleteRolePermissionsBoundary
Category
In Your Workspace
Developers
- tmod:@turbot/aws-iam#/control/types/roleBoundary
- tmod:@turbot/turbot#/control/categories/iam
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-iam#/control/types/roleBoundary"
Get Controls
Control Type URI
Category URI
GraphQL
CLI