diff --git a/modules/agentless-scanning/main.tf b/modules/agentless-scanning/main.tf index 045a697..c829913 100644 --- a/modules/agentless-scanning/main.tf +++ b/modules/agentless-scanning/main.tf @@ -26,7 +26,7 @@ data "aws_iam_session_context" "current" { data "sysdig_secure_agentless_scanning_assets" "assets" {} data "sysdig_secure_trusted_cloud_identity" "trusted_identity" { - cloud_provider = "aws" + cloud_provider = "aws" } data "sysdig_secure_tenant_external_id" "external_id" {} @@ -64,29 +64,13 @@ resource "random_id" "suffix" { # predefined/default AWSCloudFormationStackSetAdministrationRole. #----------------------------------------------------------------------------------------------------------------------------------------- -# IAM Policy Document used by Stackset roles for the KMS operations policy -data "aws_iam_policy_document" "kms_operations" { - count = !var.auto_create_stackset_roles ? 0 : 1 - - statement { - sid = "KmsOperationsAccess" - effect = "Allow" - actions = [ - "kms:*", - ] - resources = [ - "*", - ] - } -} - resource "aws_iam_role" "scanning_stackset_admin_role" { count = !var.auto_create_stackset_roles ? 0 : 1 name = "AWSCloudFormationStackSetAdministrationRoleForScanning" tags = var.tags - assume_role_policy = <