Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Deprecation of AWSElasticBeanstalkService policy #20

Open
jakubgs opened this issue Mar 11, 2021 · 0 comments
Open

Deprecation of AWSElasticBeanstalkService policy #20

jakubgs opened this issue Mar 11, 2021 · 0 comments
Assignees

Comments

@jakubgs
Copy link
Collaborator

jakubgs commented Mar 11, 2021

I got this email today:

We have detected that at least one user, group, or role in your account is currently employing the AWSElasticBeanstalkService managed policy. This policy is scheduled for deprecation and will no longer be available for attachment to new IAM users, groups, or roles after April 15, 2021.

What do I need to do?
The AWSElasticBeanstalkService policy should be replaced with the new versions of this policy:  AWSElasticBeanstalkManagedUpdatesCustomerRolePolicy.

We recommend the following actions:
• Test your environments with the new policy. This new managed policy improves security for your resources by applying a more restrictive set of permissions. Therefore, we strongly recommend that customers perform testing to ensure their environments retain access to required resources, especially if you are using the following services: AutoScaling, CodeBuild, CloudWatch Metrics, CloudWatch Logs, EC2, ECS, S3, SNS and SQS.

With this updated managed policy, the stricter naming conventions will not allow you to manage resources that were not created through Elastic Beanstalk. Also, you will not be able to manage resources that were provisioned by Elastic Beanstalk that have been renamed. If your testing reveals that any required resources do not conform to the naming conventions in the new policy, you can create and add a custom policy to manage the additional resources. Attach your custom policy along with the new Elastic Beanstalk managed policy to retain all the required access while benefiting from the managed policy. For more information see Creating a custom user policy [1] in the AWS Elastic Beanstalk Developer Guide.

• Attach the new policy to your resources. For more information, including instructions to view the content of a policy, refer [2] in the AWS Elastic Beanstalk Developer Guide.

Why do I need to take action?
The new Elastic Beanstalk managed policy improves security for your resources by applying a more restrictive set of permissions. We strongly encourage you to employ the new policy as soon as possible. Because the deprecated managed policy will no longer be maintained or supported, permissions for all upcoming Elastic Beanstalk features will be added only to the new policy after April 15, 2021.

What will happen if I do not take action?
The AWSElasticBeanstalkService policy will continue to function normally for any IAM user, group, or role attached to it before April 15, 2021. However, this deprecated policy will not receive any future updates to support new Elastic Beanstalk functionality, which may lead to future permission errors from the console or command line interface (CLI).

If you have any questions or concerns, the AWS Support Team is available on the community forums and via AWS Premium Support [3].

[1] https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/AWSHowTo.iam.managed-policies.html#AWSHowTo.iam.policies
[2] https://docs.aws.amazon.com/elasticbeanstalk/latest/dg/iam-servicerole.html
[3] https://aws.amazon.com/support

This should be fine as long as we are not creating new environments.
But we might have to update the Terraform modules to make this work in the future.

@jakubgs jakubgs self-assigned this Mar 11, 2021
@jakubgs jakubgs changed the title [prod] Deprecation of AWSElasticBeanstalkService policy Deprecation of AWSElasticBeanstalkService policy Jul 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant