SSM Policy for Instances Assumed to Be Compromised

0

If I wanted to apply a very limited custom SSM policy to instances that were assumed to be compromised, what could I remove from the AmazonSSMManagedInstanceCore managed policy? The basic need is to be able to patch the instance, run commands, change a configuration (e.g. local config file), and initiate a remote session.

AWS
已提问 1 年前211 查看次数
1 回答
2
已接受的回答

In order to patch instances, run commands, change a configuration and initiate a remote session, you would need to retain the following permissions from the AmazonSSMManagedInstanceCore policy:

  • ssm:DescribeAssociation
  • ssm:GetDeployablePatchSnapshotForInstance
  • ssm:GetDocument
  • ssm:DescribeDocument
  • ssm:GetManifest
  • ssm:GetParameter
  • ssm:GetParameters
  • ssm:ListAssociations
  • ssm:PutInventory
  • ssm:PutComplianceItems
  • ssm:PutConfigurePackageResult
  • ssm:UpdateAssociationStatus
  • ssm:UpdateInstanceAssociationStatus
  • ssm:UpdateInstanceInformation
  • ssmmessages:CreateControlChannel
  • ssmmessages:CreateDataChannel
  • ssmmessages:OpenControlChannel
  • ssmmessages:OpenDataChannel
  • ec2messages:AcknowledgeMessage
  • ec2messages:DeleteMessage
  • ec2messages:FailMessage
  • ec2messages:GetEndpoint
  • ec2messages:GetMessages
  • ec2messages:SendReply

You could remove permissions that grant broader access to other SSM resources or functionalities that are not needed in a compromised instance situation. For example, you could probably remove permissions like ssm:ListInstanceAssociations or ssm:ListComplianceItems.

profile picture
专家
已回答 1 年前
profile picture
专家
已审核 1 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则