Skip to content

Commit d6a5ac7

Browse files
author
Bob Strahan
committed
Add optional permissions boundary support for enterprise deployments
1 parent 5722d69 commit d6a5ac7

File tree

3 files changed

+22
-1
lines changed

3 files changed

+22
-1
lines changed

CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,12 @@ SPDX-License-Identifier: MIT-0
55

66
## [Unreleased]
77

8+
### Added
9+
- **Optional Permissions Boundary Support for Enterprise Deployments**
10+
- Added `PermissionsBoundaryArn` parameter to all CloudFormation templates for organizations with Service Control Policies (SCPs) requiring permissions boundaries
11+
- Comprehensive support for both explicit IAM roles and implicit roles created by AWS SAM functions with `Policies:`
12+
- Conditional implementation ensures backward compatibility - when no permissions boundary is provided, roles deploy normally
13+
814
## [0.3.8]
915

1016
### Added

docs/aws-services-and-roles.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,20 @@ This document outlines the AWS services used by the GenAI Intelligent Document P
5151

5252
## IAM Role Requirements
5353

54+
### Enterprise Deployment Considerations
55+
56+
For organizations with Service Control Policies (SCPs) that mandate permissions boundaries on all IAM roles, the solution provides comprehensive support through the `PermissionsBoundaryArn` parameter. This optional parameter can be specified during deployment to attach a permissions boundary to all IAM roles (both explicit roles and implicit roles created by AWS SAM functions).
57+
58+
**Usage:**
59+
```bash
60+
aws cloudformation deploy \
61+
--template-file template.yaml \
62+
--parameter-overrides PermissionsBoundaryArn=arn:aws:iam::123456789012:policy/MyPermissionsBoundary \
63+
--capabilities CAPABILITY_IAM
64+
```
65+
66+
When no permissions boundary is specified, roles deploy normally, ensuring backward compatibility.
67+
5468
### Deployment Roles
5569

5670
Deploying this solution requires an IAM role/user with the following permissions:

docs/well-architected.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ The GenAI Intelligent Document Processing (GenAIIDP) Accelerator demonstrates st
3030
### Strengths
3131

3232
- **Defense in Depth**: Multiple security layers including IAM roles with least privilege, encryption at rest, and secure API access.
33+
- **Enterprise IAM Governance**: Comprehensive support for IAM permissions boundaries to comply with organizational Service Control Policies (SCPs) that mandate permissions boundaries on all IAM roles.
3334
- **Content Safety**: Integration with Amazon Bedrock Guardrails to enforce content policies, block sensitive information, and prevent model misuse.
3435
- **Authentication**: Cognito user pools with configurable password policies and MFA support.
3536
- **Authorization**: Fine-grained access controls for different components and resources.
@@ -146,4 +147,4 @@ The GenAI Intelligent Document Processing Accelerator demonstrates strong alignm
146147

147148
Key strengths include the serverless architecture, which provides automatic scaling and resilience, and the comprehensive monitoring capabilities that enable operational visibility. The solution's modular design allows for customization and extension to meet specific business requirements.
148149

149-
Areas for potential enhancement include more granular cost controls, multi-region resilience strategies, and sustainability optimizations. By addressing these recommendations, the solution can further improve its alignment with Well-Architected best practices.
150+
Areas for potential enhancement include more granular cost controls, multi-region resilience strategies, and sustainability optimizations. By addressing these recommendations, the solution can further improve its alignment with Well-Architected best practices.

0 commit comments

Comments
 (0)