Minimal AWS IAM Policy for Packer

If we are working on a restricted or secure AWS environment and we need to use Packer, we can create a custom IAM policy for EC2 instances with the minimal permissions required:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:AttachVolume",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CopyImage",
"ec2:CreateImage"…

--

--

--

Certified AWS, Azure & GCP Architect | HashiCorp Ambassador | Terraform SME | KopiCloud Founder | Entrepreneur & Innovator | Book Author | Husband & Dad of ✌

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Offline Voice AI on Arduino

READ/DOWNLOAD*- Enterprise Architecture As Strategy: Creating a Foundation for Business Execution…

Generalising Binary Search

How to Setup AWS CloudFront and S3 to Serve Private Content for Html5/Mobile Games?

Ebebe James Chibueze -Information Technology used for Specific Purpose

Cloudbusting

The Ephemeral Node release is live! Important changes.

Nine Rules for Writing Python Extensions in Rust

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Guillermo Musumeci

Guillermo Musumeci

Certified AWS, Azure & GCP Architect | HashiCorp Ambassador | Terraform SME | KopiCloud Founder | Entrepreneur & Innovator | Book Author | Husband & Dad of ✌

More from Medium

Year 2021 in Awesome Cloud ☁️

Deploying Fleet on AWS with Terraform

All About AWS Compute Services

Securely Access Your AWS Resources From Github Actions