Skip to content

Commit

Permalink
Update README
Browse files Browse the repository at this point in the history
  • Loading branch information
BRMatt committed Jan 6, 2019
1 parent b9f2717 commit 758c45c
Showing 1 changed file with 5 additions and 4 deletions.
9 changes: 5 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,8 @@ third party, they would only be usable for a short period of time.
Secondly, if the credentials for the IAM user are leaked, the attacker
will only be able to assume IAM roles. If they do not know the ARN of
your role they will not be able to assume it, and thus won't be able to
perform actions on your account.
perform actions on your account. You then only need to rotate one set of
credentials, rather credentials for all of your AWS accounts.

Note that if you're using the role name suggested in these docs then
they will likely be able to guess the full ARN, as you can always get
Expand Down Expand Up @@ -68,12 +69,12 @@ This IAM user should have the following permission policy:
}
```

Note that the `*` in the ARN allows this suser to assume the
Note that the `*` in the ARN allows this user to assume the
`SlashInfraInspection` role in any AWS account that:

- has that role
- has marked your AWS account ID as a "Trusted entity" in the role's
"Trust relationships"
- has marked the IAM user's AWS account ID as a "Trusted entity" in the
role's "Trust relationships"

If these are new concepts for you, I'd really recommend reading [AWS'
documentation on IAM
Expand Down

0 comments on commit 758c45c

Please sign in to comment.