Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fine grained access control using leading keys in dynamo #98

Open
s1mrankaur opened this issue Dec 24, 2021 · 0 comments
Open

Fine grained access control using leading keys in dynamo #98

s1mrankaur opened this issue Dec 24, 2021 · 0 comments

Comments

@s1mrankaur
Copy link

I am planning to have the lambda authorizer generate a dynamic policy and assume a role based on the policy for tenant segregation. We already use serverless-iam-roles-per-function to limit lambda's access to AWS resources.

How does this sit with the dynamic policy generated to assume the role and thus limit access to S3 and dynamo (using leading keys and prefixes).

Should I remove dynamo from the IAM statement for the functions completely and let that be added through the dynamically generated policy or something else?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant