Security News
38% of CISOs Fear They’re Not Moving Fast Enough on AI
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
awspolicy is a command-line tool for generating custom AWS IAM policies with ease. Specify services, resources, and permissions through simple commands to create tailored security policies for your AWS projects.
awspolicy
is a command-line tool for generating custom AWS IAM policies with ease. Specify services, resources, and permissions through simple commands to create tailored security policies for your AWS projects.
Disclaimer: Not affiliated with AWS and is not an official AWS product. It is a personal project created to simplify the process of generating IAM policies for AWS services with a command-line interface. For a more user-friendly policy generator, consider using the Policy Generator of AWS.
$ npm install awspolicy -g
Options:
-v, --version output the version number
-s, --service <type> AWS service (e.g., s3, ecr)
-b, --bucket <name> S3 bucket name (required for S3)
-rp, --repositories <name> Comma-separated list of ECR repository names (required for ECR)
-rg, --region <region> AWS region (e.g., ap-southeast-2)
-a, --account-id <accountId> AWS account ID (e.g., 021704626424)
-p, --permission <levels> Permissions for the selected service.
For S3: binary format (e.g., 111).
For ECR: comma-separated list of actions (e.g., ListImages,PutImage)
-t, --template <name> Template for predefined permissions (e.g., generic for ECR)
-h, --help display help for command
$ awspolicy -s s3 -b my-bucket -p 111
We have a predefined template called generic
which provides the following permissions,
BatchCheckLayerAvailability
InitiateLayerUpload
UploadLayerPart
CompleteLayerUpload
PutImage
BatchGetImage
GetDownloadUrlForLayer
GetAuthorizationToken
is added separately to the policy to allow the user to authenticate, no need to specify it.
$ awspolicy -s ecr -rg ap-southeast-2 -a 12345678 -rp my-repo -t generic
Permissions can be manually specified as well
$ awspolicy -s ecr -rg ap-southeast-2 -a 12345678 -rp my-repo -p BatchCheckLayerAvailability,InitiateLayerUpload,UploadLayerPart,CompleteLayerUpload,PutImage,BatchGetImage,GetDownloadUrlForLayer
Feel free to open an issue or submit a pull request. Adding other AWS services such as EC2, SES etc is highly encouraged.
FAQs
awspolicy is a command-line tool for generating custom AWS IAM policies with ease. Specify services, resources, and permissions through simple commands to create tailored security policies for your AWS projects.
The npm package awspolicy receives a total of 0 weekly downloads. As such, awspolicy popularity was classified as not popular.
We found that awspolicy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
CISOs are racing to adopt AI for cybersecurity, but hurdles in budgets and governance may leave some falling behind in the fight against cyber threats.
Research
Security News
Socket researchers uncovered a backdoored typosquat of BoltDB in the Go ecosystem, exploiting Go Module Proxy caching to persist undetected for years.
Security News
Company News
Socket is joining TC54 to help develop standards for software supply chain security, contributing to the evolution of SBOMs, CycloneDX, and Package URL specifications.