Skip to content

Commit

Permalink
Bakst feedback
Browse files Browse the repository at this point in the history
  • Loading branch information
tsmithv11 authored Dec 9, 2024
1 parent bd23b94 commit 3292f91
Showing 1 changed file with 3 additions and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@

=== Description

This policy ensures that AWS SQS policies do not allow unrestricted (*) actions. Allowing all actions in a policy can expose your SQS queue to potential misuse or unauthorized access, posing a security risk. Restricting the actions to only those required for your application ensures adherence to the principle of least privilege.
This policy ensures that AWS SQS policies are configured to limit permissions to specific actions, avoiding the use of unrestricted wildcards like (*), in adherence to the principle of least privilege. By restricting actions to only those necessary for your application, you mitigate the risk of unauthorized access and potential misuse of your SQS queue.


=== Fix - Buildtime
Expand All @@ -39,6 +39,8 @@ This policy ensures that AWS SQS policies do not allow unrestricted (*) actions.
* *Arguments:* aws_sqs_queue_policy
* *Attribute*: policy.Statement.Action

In the following example, the IAM policy is configured to allow only the `sqs:SendMessage` action, restricting access to the SQS queue. This helps prevent unauthorized actions and enhances security.


[source,go]
----
Expand Down

0 comments on commit 3292f91

Please sign in to comment.