Is there a way in AWS to limit what kind of roles and policies another role can create?
In my setup, I have two kinds of admin roles: AccountAdmin
and InfraAdmin
. The AccountAdmin
one having more rights while the InfraAdmin
having only the needed set of rights to run day to day operations.
Now I have a situation where the InfraAdmin
role needs rights to create bundles where I have EC2 instance, RDS database and S3 bucket (slightly simplified description, so that we can focus on the main point). Together these form a logical single service and I have multiple of these bundles that should not be able to access other's RDS databases or S3 buckets. To allow EC2 instance to access its RDS database and S3 bucket, I'm creating instance profile, role and policies. Currently this requires me to grant rights to the InfraAdmin
to create roles and policies and it kind of destroys the principle of least privilege and the split between AccountAdmin
and InfraAdmin
becomes pointless.
Is there a way to limit what kind of policies and roles InfraAdmin
role can create so that it cannot be used for granting extra rights to itself or create new more powerful roles?