Minimal AWS IAM Policy for Packer

If we are working on a restricted or secure AWS environment and we need to use Packer, we can create a custom IAM policy for EC2 instances with the minimal permissions required:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:AttachVolume",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CopyImage",
"ec2:CreateImage"…

--

--

--

Certified AWS, Azure & GCP Architect | HashiCorp Ambassador | Terraform SME | KopiCloud Founder | ex-AWS | Entrepreneur | Book Author | Husband & Dad of ✌

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Lok Sewa Aayoge Civil Engineering Model Set 5

Lok Sewa Aayoge Civil Engineering Model Set 5

Vim: The editor you need, but not the one you deserve

Why should you care about PWA

How to Develop Flutter App for Beginners & Benefits

Class Extraction: Or Why You Don’t Want to Practise Digital Dentistry

BDD Addict Newsletter June 2017

TP-Link 10/100/1000Mbps Gigabit PCI Network Adapter/Card Includes Low-profile Bracket (TG-3269)

Intro to Kafka— shawnlyu

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Guillermo Musumeci

Guillermo Musumeci

Certified AWS, Azure & GCP Architect | HashiCorp Ambassador | Terraform SME | KopiCloud Founder | ex-AWS | Entrepreneur | Book Author | Husband & Dad of ✌

More from Medium

Security Groups and Security Group Rules with Terraform

Secure AWS to Azure integration

Building a Development Environment with AWS resources in Terraform

Getting started with Terraform