Restrict vault copy destination

0

We use AWS Backup in multiple member accounts in an organization, with Backup Plans set to copy to a master vault in a central account. When we want to recover by copying from the master back to a member account, we notice that you can change to copy recovery points to a different AWS account. Do you know if there is a way that we can use IAM conditions to define a list of AWS accounts that can only be used as target vaults? For example, the central account has the 'backup:copy*' IAM permissions, but there is a condition in that it can only do so to accounts 111111111, 2222222 and 3333333. Any attempt to set the destination vault with a different account will be denied. In essence, we are looking to see how we can use IAM conditions as a whitelist of approved account numbers when initiating a copy job. We want to use this as a way to mitigate data exfiltration to a non-trusted account.

Do you know how we would do this in IAM, or is another method recommended?

Thanks

질문됨 9달 전212회 조회
1개 답변
0

Perhaps putting something like this in the "Conditions" section of your policy could work:

"Condition": { "StringEquals": { "aws:ResourceAccount": [ "222222222222" ] } }

You can let me know if that works. Thanks.

profile pictureAWS
전문가
답변함 9달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠