Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Policy Packs
Deny all AWS IAM actions from Unapproved Networks
  • AWS > IAM > Role > Boundary
  • AWS > IAM > Role > Boundary > Policy
  • AWS > IAM > Stack
  • AWS > IAM > Stack > Source

Policy Settings

The Deny all AWS IAM actions from Unapproved Networks policy pack has 4 policy settings:

PolicySettingNote
AWS > IAM > Role > BoundaryCalculated
AWS > IAM > Role > Boundary > PolicymyBoundaryPolicy
AWS > IAM > StackCheck: Configured
AWS > IAM > Stack > Source ### Deny Actions from unapproved CIDRs ### resource "aws_iam_policy" "main" { # Boundary policy name that will be applied to the IAM role. name = "myBoundaryPolicy" path = "/" description = "Guardrails Managed Boundary policy to prevent actions from unapproved CIDRs" policy = jsonencode({ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "*" "Resource": "*", "Condition": { "IpAddress": { "aws:SourceIp": [ "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16" ] } } } ] }) }
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy