@@ -75,6 +75,8 @@ resource "aws_iam_policy" "lambda_management" {
7575 Resource = [
7676 " arn:aws:lambda:*:${ data . aws_caller_identity . current . account_id } :function:eligibility_signposting_api" ,
7777 " arn:aws:lambda:*:${ data . aws_caller_identity . current . account_id } :function:eligibility_signposting_api:*" ,
78+ " arn:aws:lambda:*:${ data . aws_caller_identity . current . account_id } :function:default-CreatePendingSecretFunction" ,
79+ " arn:aws:lambda:*:${ data . aws_caller_identity . current . account_id } :function:default-PromoteToCurrentFunction" ,
7880 " arn:aws:lambda:*:580247275435:layer:LambdaInsightsExtension:*"
7981 ]
8082 }
@@ -420,7 +422,12 @@ resource "aws_iam_policy" "api_infrastructure" {
420422 " wafv2:DisassociateWebACL" ,
421423 " wafv2:PutLoggingConfiguration" ,
422424 " wafv2:GetLoggingConfiguration" ,
423- " wafv2:DeleteLoggingConfiguration"
425+ " wafv2:DeleteLoggingConfiguration" ,
426+
427+ # State Machine
428+ " states:DescribeStateMachine" ,
429+ " states:ListStateMachineVersions" ,
430+ " states:ListTagsForResource"
424431 ],
425432
426433
@@ -443,6 +450,7 @@ resource "aws_iam_policy" "api_infrastructure" {
443450 " arn:aws:events:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :rule/cloudwatch-alarm-state-change-to-splunk*" ,
444451 " arn:aws:wafv2:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :regional/webacl/*" ,
445452 " arn:aws:wafv2:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :regional/managedruleset/*" ,
453+ " arn:aws:states:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :stateMachine:SecretRotationWorkflow" ,
446454 ]
447455 },
448456 ]
@@ -562,6 +570,9 @@ resource "aws_iam_policy" "iam_management" {
562570 " arn:aws:iam::*:policy/*PermissionsBoundary" ,
563571 " arn:aws:iam::*:policy/*PutSubscriptionFilterPolicy" ,
564572 " arn:aws:iam::*:policy/*CWLogsToCSOCDestinationPolicy" ,
573+ " arn:aws:iam::*:policy/rotation_secrets_policy" ,
574+ " arn:aws:iam::*:policy/rotation_sfn_policy" ,
575+ " arn:aws:iam::*:policy/eventbridge_sfn_start_policy" ,
565576 # VPC flow logs role
566577 " arn:aws:iam::*:role/vpc-flow-logs-role" ,
567578 # API role
@@ -692,7 +703,8 @@ resource "aws_iam_policy" "cloudwatch_management" {
692703 " sns:Subscribe" ,
693704 " sns:Unsubscribe" ,
694705 " sns:ListSubscriptions" ,
695- " sns:ListSubscriptionsByTopic"
706+ " sns:ListSubscriptionsByTopic" ,
707+ " sns:GetSubscriptionAttributes"
696708 ],
697709 Resource = [
698710 " arn:aws:logs:${ var . default_aws_region } :${ data . aws_caller_identity . current . account_id } :log-group:/aws/kinesisfirehose/*" ,
0 commit comments