You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Are you working out of a pipenv environment, Docker, or something else?
Working out of the continuous auditor in Docker + Fargate using cross account roles.
For some accounts with restricted keys the following is logged as an error:
kms.get_key_policy({'KeyId': 'xxx', 'PolicyName': 'default'}): An error occurred (AccessDeniedException) when calling the GetKeyPolicy operation: User: arn:aws:sts::xxx:assumed-role/CloudMapper/botocore-session-xxx is not authorized to perform: kms:GetKeyPolicy on resource: arn:aws:kms:us-west-2:xxx:key/xxx
Please mention the following:
What command was run?
The collect command
Are you working out of a pipenv environment, Docker, or something else?
Working out of the continuous auditor in Docker + Fargate using cross account roles.
For some accounts with restricted keys the following is logged as an error:
I think it should likely be added to the list of KMS AccessDenied exceptions here:https://github.com/duo-labs/cloudmapper/blob/master/commands/collect.py#L150 handled for restricted keys. If this is true I will PR a fix.
The text was updated successfully, but these errors were encountered: