diff --git a/modules/services/cloud-bench/README.md b/modules/services/cloud-bench/README.md
index 0733cdc8..a2875746 100644
--- a/modules/services/cloud-bench/README.md
+++ b/modules/services/cloud-bench/README.md
@@ -55,6 +55,7 @@ No modules.
|------|-------------|------|---------|:--------:|
| [is\_organizational](#input\_is\_organizational) | true/false whether secure-for-cloud should be deployed in an organizational setup (all accounts of org) or not (only on default aws provider account) | `bool` | `false` | no |
| [name](#input\_name) | The name of the IAM Role that will be created. | `string` | `"sfc-cloudbench"` | no |
+| [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn) | ARN of a permissions boundary policy to attach to the cloudbench role | `string` | `null` | no |
| [provision\_caller\_account](#input\_provision\_caller\_account) | true/false whether to provision the aws provider account (if is\_organizational=true management account, if is\_organizational=false it will depend on the provider setup on the caller module | `bool` | `true` | no |
| [region](#input\_region) | Default region for resource creation in organization mode | `string` | `"eu-central-1"` | no |
| [tags](#input\_tags) | customization of tags to be assigned to all resources.
always include 'product' default tag for resource-group proper functioning.
can also make use of the [provider-level `default-tags`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#default_tags) | `map(string)` |
{| no | diff --git a/modules/services/cloud-bench/main.tf b/modules/services/cloud-bench/main.tf index 6f962e66..503455f5 100644 --- a/modules/services/cloud-bench/main.tf +++ b/modules/services/cloud-bench/main.tf @@ -69,9 +69,10 @@ data "aws_iam_policy_document" "trust_relationship" { resource "aws_iam_role" "cloudbench_role" { count = var.is_organizational && !var.provision_caller_account ? 0 : 1 - name = var.name - assume_role_policy = data.aws_iam_policy_document.trust_relationship.json - tags = var.tags + name = var.name + assume_role_policy = data.aws_iam_policy_document.trust_relationship.json + tags = var.tags + permissions_boundary = var.permissions_boundary_arn } diff --git a/modules/services/cloud-bench/variables.tf b/modules/services/cloud-bench/variables.tf index cd1e98fa..4fde8d25 100644 --- a/modules/services/cloud-bench/variables.tf +++ b/modules/services/cloud-bench/variables.tf @@ -34,3 +34,9 @@ variable "tags" { "product" = "sysdig-secure-for-cloud" } } + +variable "permissions_boundary_arn" { + type = string + description = "ARN of a permissions boundary policy to attach to the cloudbench role" + default = null +}
"product": "sysdig-secure-for-cloud"
}