plain-lunch-16168
06/05/2024, 12:49 PMlittle-cartoon-10569
06/05/2024, 8:45 PMplain-lunch-16168
06/05/2024, 9:16 PMlittle-cartoon-10569
06/05/2024, 10:10 PMplain-lunch-16168
06/05/2024, 10:20 PMplain-lunch-16168
06/05/2024, 10:26 PMpulumi up
without pulumi login
such that the state is tracked locally and so the s3 state file is not suitable for protecting against any one with access to root to make any infrastructure changes?modern-zebra-45309
06/05/2024, 10:32 PMmodern-zebra-45309
06/05/2024, 10:33 PMmodern-zebra-45309
06/05/2024, 10:34 PMplain-lunch-16168
06/05/2024, 10:38 PMIf you have infrastructure that should only be changed by a select group of users, make sure that only these users have the necessary permissions to do so.Yes, our thought was that AWS control tower, permission group definitions and s3 state files should be created in root account, such that only users that have access to the root account can alter them. Any other resources would be in another account and could thus be altered by those that have access to that account. However, that means that users need cross-account permission to the s3 state bucket (or at least parts of it) that is in the root account.
modern-zebra-45309
06/05/2024, 10:39 PMplain-lunch-16168
06/05/2024, 10:40 PMIf you have infrastructure that should only be changed by a select group of users, make sure that only these users have the necessary permissions to do so.How would you do that? I mean, one could go crazy and define for each group which kind of AWS resources they are allowed to alter? Or the other extreme would be that any user can do anything for a respective account?
plain-lunch-16168
06/05/2024, 10:42 PMmodern-zebra-45309
06/05/2024, 10:43 PMkilian-*
restrict my S3 permissions to these bucketsmodern-zebra-45309
06/05/2024, 10:43 PMPS: Maybe I am asking the wrong question, feel free to correct!I don't think you're asking the wrong questions but you seem to be solving a problem that you might not have in the first place
modern-zebra-45309
06/05/2024, 10:44 PMmodern-zebra-45309
06/05/2024, 10:46 PMmodern-zebra-45309
06/05/2024, 10:46 PMmodern-zebra-45309
06/05/2024, 10:48 PMplain-lunch-16168
06/05/2024, 10:50 PMplain-lunch-16168
06/05/2024, 10:51 PMplain-lunch-16168
06/05/2024, 10:51 PMplain-lunch-16168
06/05/2024, 10:52 PMplain-lunch-16168
06/05/2024, 10:53 PMplain-lunch-16168
06/05/2024, 10:54 PMpulumi login
to the respective backend while still being logged in to the respective AWS account?little-cartoon-10569
06/05/2024, 11:21 PMlittle-cartoon-10569
06/05/2024, 11:24 PMplain-lunch-16168
06/05/2024, 11:28 PMplain-lunch-16168
06/05/2024, 11:30 PMlittle-cartoon-10569
06/05/2024, 11:38 PMlittle-cartoon-10569
06/05/2024, 11:40 PMlittle-cartoon-10569
06/05/2024, 11:42 PMplain-lunch-16168
06/05/2024, 11:45 PMplain-lunch-16168
06/05/2024, 11:46 PMplain-lunch-16168
06/05/2024, 11:46 PMplain-lunch-16168
06/05/2024, 11:47 PMNo matter how you like to participate in developer communities, Pulumi wants to meet you there. If you want to meet other Pulumi users to share use-cases and best practices, contribute code or documentation, see us at an event, or just tell a story about something cool you did with Pulumi, you are part of our community.
Powered by