Fix Corey's link and tidy up some formatting and verbiage

This commit is contained in:
R Tyler Croy 2020-03-19 14:36:32 -07:00
parent da96ffc783
commit a6beae67a7
No known key found for this signature in database
GPG Key ID: E5C92681BEF6CEA2
1 changed files with 7 additions and 7 deletions

View File

@ -11,12 +11,11 @@ team: Core Platform
author: rtyler
---
IAM is a very powerful tool, it can also be very complex to use effectively. In
our migration into AWS, a number of Scribd developers have had varying levels
of success in climbing Mount IAM. For some use-cases, where a resource needs to
be accessed across an AWS Account boundary, the steeper learning curve has
proven far too challenging for some, myself included.
IAM is a **very** powerful tool. It can also be very complex, and difficult to
use effectively. In our migration into AWS a number of Scribd developers have
had varying levels of success in climbing Mount IAM. For some use-cases where a
resource needs to be accessed across an AWS Account boundary, the steeper
learning curve has proven far too challenging for some, myself included.
We heavily rely on an AWS Organization and a hierarchy of AWS Accounts
to help us separate billing and provide a hard-separation between some
@ -57,7 +56,7 @@ cquinn* | https://aws.amazon.com/blogs/security/control-access-to-aws-resources-
cquinn* | Cheer up, Im sure it works in YAML.
```
Thankfully, [Corey](twitter.com/QuinnyPig/) was 100% correct, the
Thankfully, [Corey](https://twitter.com/QuinnyPig/) was 100% correct, the
`AWS:PrincipalOrgID` condition in the IAM policy document would allow the exact
type of quasi-global read-only access I was after. Below is a snippet of
Terraform which defines the policy:
@ -100,6 +99,7 @@ With the above policy applied via the `aws_ecr_repository_policy` resource to
our production ECRs, developers across the company can now access our
containers in their CodeBuild, ECS, EKS, and other AWS-based resources without
problem!
```terraform
data "aws_iam_policy_document" "ecr_access" {
source_json = data.aws_iam_policy_document.ecr_readonly_access.json