Changes to S3, KMS, and IAM Policies to facilitate IAM Access Analyzer policy generation
To support the use of IAM Access Analyzer policy generation, changes are being introduced to the way Stax configures certain policies in AWS, as summarised below. These changes are not expected to cause any operational impact, however some security tools may make a note of their alteration.
On 6 February 2025 at 2200 UTC (Friday, 7 February 9:00 AM AEDT), these changes will commence rolling out across Stax-managed AWS Organizations. The rollout is expected to complete within 3 hours, complete by 7 February 2025 at 0100 UTC.
- The Stax-managed CloudTrail S3 bucket now disables ACLs to align with AWS's S3 recommendedations and bucket defaults
- An additional statement is added to the CloudTrail S3 Bucket Policy to allow read access to the CloudTrail bucket for the
/service-role/AccessAnalyzerMonitorServiceRole*
IAM role pattern - An additional statement is added to the CloudTrail KMS Key Policy to allow decryption by the
/service-role/AccessAnalyzerMonitorServiceRole*
IAM role pattern - A new role named
/service-role/AccessAnalyzerMonitorServiceRole_stax
is added to each Stax-managed AWS Account for use by IAM Access Analyzer Policy generation
For more information about the Stax configuration, see Using IAM Access Analyzer Policy Generation with Stax.
Please raise a support case or contact your Customer Success Manager if you have any questions.