Currently, I have an Amplify app that has 3 back-end environments:
Prod
Staging
Dev
What would be the IAM policies that should be applied on a new IAM user in order to give access only to one single back-end environment, let's say Dev?
Each environments has AWS S3, DynamoDB, AppSync, and Cognito.
I have set policies on all of those AWS Services and they are all properly secured, meaning that the new IAM User can only access to Dev environments in each of the services.
But when it comes to setup policies to Amplify, even with the most strict policies I set, the new IAM user can still access all the 3 back-end environments and modify configurations through Amplify, even if he can't directly on the service.
E.g. The user can go on Staging or Prod and change the password settings on Amplify Authentication and deploy changes, but he cannot do it using Cognito.
Any solutions for this issue?