Created
July 6, 2023 18:13
-
-
Save jamesiarmes/878dac85e2593ec348a230116f036054 to your computer and use it in GitHub Desktop.
AWS Control Tower execution role for existing accounts
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Description: Create permissions required for AWS Control Tower | |
Parameters: | |
ManagementAccountID: | |
Type: String | |
Default: '' | |
Description: Id of the management account for the AWS organization | |
Resources: | |
AWSControlTowerExecution: | |
Type: AWS::IAM::Role | |
DeletionPolicy: Retain | |
Properties: | |
RoleName: AWSControlTowerExecution | |
AssumeRolePolicyDocument: | |
Version: '2012-10-17' | |
Statement: | |
- Effect: Allow | |
Principal: | |
AWS: !Sub "arn:${AWS::Partition}:iam::${ManagementAccountID}:root" | |
Action: 'sts:AssumeRole' | |
ManagedPolicyArns: | |
- 'arn:${AWS::Partition}:iam::aws:policy/AdministratorAccess' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment