Step 7 - Create IAM CSPM Policy
- Click Services and select IAM.
- Select Policies and click Create Policy.
- Click the JSON tab.
- Copy and paste the policy information:
{ "Statement": [ { "Action": [ "account:*", "cloudhsm:AddTagsToResource", "cloudhsm:DescribeClusters", "cloudhsm:DescribeHsm", "cloudhsm:ListHsms", "cloudhsm:ListTags", "cloudhsm:ListTagsForResource", "cloudhsm:TagResource", "cloudtrail:AddTags", "cloudtrail:DescribeTrails", "cloudtrail:GetEventSelectors", "cloudtrail:GetTrailStatus", "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmsForMetric", "cloudwatch:TagResource", "config:Describe*", "dynamodb:ListStreams", "dynamodb:TagResource", "ec2:CreateTags", "ec2:Describe*", "ecs:DescribeClusters", "ecs:ListClusters", "ecs:TagResource", "elasticbeanstalk:AddTags", "elasticfilesystem:CreateTags", "elasticfilesystem:DescribeFileSystems", "elasticloadbalancing:AddTags", "elasticloadbalancing:DescribeLoadBalancers", "elasticloadbalancing:DescribeTags", "glacier:AddTagsToVault", "glacier:ListVaults", "iam:GenerateCredentialReport", "iam:Get*", "iam:List*", "iam:PassRole", "kms:DescribeKey", "kms:ListAliases", "kms:ListKeys", "lambda:ListFunctions", "lambda:TagResource", "logs:DescribeLogGroups", "logs:DescribeMetricFilters", "rds:AddTagsToResource", "rds:DescribeDBInstances", "redshift:CreateTags", "redshift:DescribeClusters", "s3:GetBucketAcl", "s3:GetBucketLocation", "s3:GetBucketWebsite", "s3:ListAllMyBuckets", "s3:ListBucket", "s3:PutBucketTagging", "sdb:ListDomains", "secretsmanager:ListSecrets", "secretsmanager:TagResource", "sns:GetTopicAttributes", "sns:List*", "tag:GetResources", "tag:GetTagKeys", "tag:GetTagValues", "tag:TagResources", "tag:UntagResources" ], "Effect": "Allow", "Resource": "*", "Sid": "LookoutCASBAwsCspmPolicy" } ], "Version": "2012-10-17" }
- Click Review Policy.
- Name the policy lookout-cspm-policy and click Create Policy.