Policy: AWS > VPC > Endpoint > Policy > Trusted Access > Organization Restrictions
List of AWS Organization IDs that are trusted for cross-account access in the AWS VPC endpoint policy, or '*' to skip the Organization Restriction.
Note that Trusted Access > Accounts
and Trusted Access > Organizations
are evaluated independently. To have access, an AWS principal must be allowed in Trusted Access > Accounts
AND be a member of an Organization that is allowed in Trusted Access > Organizations
.
Note: Trusted Access > Organization Restrictions
are ONLY applied to AWS principals. Services and Federated principals do NOT contain the aws:PrincipalOrgId
condition key, and thus cannot be validated against the Organization.example: - "o-333333333" - "o-c3a5y4wd52"
Resource Types
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Controls
Policy Specification
Schema Type |
|
---|---|
Default template |
|
Default template input |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/securityTrustedAccess
- tmod:@turbot/aws-vpc-internet#/policy/types/vpcEndpointPolicyTrustedOrganizations
- turbot graphql policy-type --id "tmod:@turbot/aws-vpc-internet#/policy/types/vpcEndpointPolicyTrustedOrganizations"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws-vpc-internet#/policy/types/vpcEndpointPolicyTrustedOrganizations"
Get Policy TypeGet Policy Settings