AWSTemplateFormatVersion: "2010-09-09" Description: > This CloudFormation template creates a role assumed by CloudFormation during CRUDL operations to mutate resources on behalf of the customer. Resources: ExecutionRole: Type: AWS::IAM::Role Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: resources.cloudformation.amazonaws.com Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "ec2:DescribeAvailabilityZones" - "fms:DeletePolicy" - "fms:GetPolicy" - "fms:ListPolicies" - "fms:ListTagsForResource" - "fms:PutPolicy" - "fms:TagResource" - "fms:UntagResource" - "network-firewall:DescribeRuleGroup" - "route53resolver:ListFirewallRuleGroups" - "s3:GetBucketPolicy" - "s3:PutBucketPolicy" - "waf-regional:ListRuleGroups" - "wafv2:CheckCapacity" - "wafv2:ListAvailableManagedRuleGroupVersions" - "wafv2:ListAvailableManagedRuleGroups" - "wafv2:ListRuleGroups" Resource: "*" Outputs: ExecutionRoleArn: Value: Fn::GetAtt: ExecutionRole.Arn