Skip to content

Commit 8642c23

Browse files
author
AWS
committed
Access Analyzer Update: This release adds support for policy validation and external access findings for DynamoDB tables and streams. IAM Access Analyzer helps you author functional and secure resource-based policies and identify cross-account access. Updated service API, documentation, and paginators.
1 parent 1eb1505 commit 8642c23

File tree

2 files changed

+41
-2
lines changed

2 files changed

+41
-2
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Access Analyzer",
4+
"contributor": "",
5+
"description": "This release adds support for policy validation and external access findings for DynamoDB tables and streams. IAM Access Analyzer helps you author functional and secure resource-based policies and identify cross-account access. Updated service API, documentation, and paginators."
6+
}

services/accessanalyzer/src/main/resources/codegen-resources/service-2.json

Lines changed: 35 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1305,6 +1305,14 @@
13051305
"s3ExpressDirectoryBucket":{
13061306
"shape":"S3ExpressDirectoryBucketConfiguration",
13071307
"documentation":"<p>The access control configuration is for an Amazon S3 directory bucket.</p>"
1308+
},
1309+
"dynamodbStream":{
1310+
"shape":"DynamodbStreamConfiguration",
1311+
"documentation":"<p>The access control configuration is for a DynamoDB stream.</p>"
1312+
},
1313+
"dynamodbTable":{
1314+
"shape":"DynamodbTableConfiguration",
1315+
"documentation":"<p>The access control configuration is for a DynamoDB table or index.</p>"
13081316
}
13091317
},
13101318
"documentation":"<p>Access control configuration structures for your resource. You specify the configuration as a type-value pair. You can specify only one type of access control configuration.</p>",
@@ -1519,6 +1527,28 @@
15191527
},
15201528
"documentation":"<p>Deletes an archive rule.</p>"
15211529
},
1530+
"DynamodbStreamConfiguration":{
1531+
"type":"structure",
1532+
"members":{
1533+
"streamPolicy":{
1534+
"shape":"DynamodbStreamPolicy",
1535+
"documentation":"<p>The proposed resource policy defining who can access or manage the DynamoDB stream.</p>"
1536+
}
1537+
},
1538+
"documentation":"<p>The proposed access control configuration for a DynamoDB stream. You can propose a configuration for a new DynamoDB stream or an existing DynamoDB stream that you own by specifying the policy for the DynamoDB stream. For more information, see <a href=\"https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html\">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB stream and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the stream.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB stream without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB stream policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>"
1539+
},
1540+
"DynamodbStreamPolicy":{"type":"string"},
1541+
"DynamodbTableConfiguration":{
1542+
"type":"structure",
1543+
"members":{
1544+
"tablePolicy":{
1545+
"shape":"DynamodbTablePolicy",
1546+
"documentation":"<p>The proposed resource policy defining who can access or manage the DynamoDB table.</p>"
1547+
}
1548+
},
1549+
"documentation":"<p>The proposed access control configuration for a DynamoDB table or index. You can propose a configuration for a new DynamoDB table or index or an existing DynamoDB table or index that you own by specifying the policy for the DynamoDB table or index. For more information, see <a href=\"https://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_PutResourcePolicy.html\">PutResourcePolicy</a>.</p> <ul> <li> <p>If the configuration is for an existing DynamoDB table or index and you do not specify the DynamoDB policy, then the access preview uses the existing DynamoDB policy for the table or index.</p> </li> <li> <p>If the access preview is for a new resource and you do not specify the policy, then the access preview assumes a DynamoDB table without a policy.</p> </li> <li> <p>To propose deletion of an existing DynamoDB table or index policy, you can specify an empty string for the DynamoDB policy.</p> </li> </ul>"
1550+
},
1551+
"DynamodbTablePolicy":{"type":"string"},
15221552
"EbsGroup":{"type":"string"},
15231553
"EbsGroupList":{
15241554
"type":"list",
@@ -3176,7 +3206,9 @@
31763206
"AWS::RDS::DBSnapshot",
31773207
"AWS::RDS::DBClusterSnapshot",
31783208
"AWS::SNS::Topic",
3179-
"AWS::S3Express::DirectoryBucket"
3209+
"AWS::S3Express::DirectoryBucket",
3210+
"AWS::DynamoDB::Table",
3211+
"AWS::DynamoDB::Stream"
31803212
]
31813213
},
31823214
"RetiringPrincipal":{"type":"string"},
@@ -3858,7 +3890,8 @@
38583890
"AWS::S3::AccessPoint",
38593891
"AWS::S3::MultiRegionAccessPoint",
38603892
"AWS::S3ObjectLambda::AccessPoint",
3861-
"AWS::IAM::AssumeRolePolicyDocument"
3893+
"AWS::IAM::AssumeRolePolicyDocument",
3894+
"AWS::DynamoDB::Table"
38623895
]
38633896
},
38643897
"ValidatePolicyResponse":{

0 commit comments

Comments
 (0)