AWSTemplateFormatVersion: "2010-09-09" Description: > This CloudFormation template creates a role assumed by CloudFormation during CRUDL operations to mutate resources on behalf of the customer. Resources: ExecutionRole: Type: AWS::IAM::Role Properties: MaxSessionDuration: 8400 AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Principal: Service: resources.cloudformation.amazonaws.com Action: sts:AssumeRole Path: "/" Policies: - PolicyName: ResourceTypePolicy PolicyDocument: Version: '2012-10-17' Statement: - Effect: Allow Action: - "ec2:CreateNetworkInterface" - "ec2:DeleteNetworkInterface" - "ec2:DescribeNetworkInterfaces" - "ec2:DescribeRouteTables" - "ec2:DescribeSecurityGroups" - "ec2:DescribeSubnets" - "ec2:DescribeVpcs" - "eks:DescribeCluster" - "iam:GetPolicy" - "iam:GetPolicyVersion" - "iam:GetRole" - "iam:ListAttachedRolePolicies" - "iam:ListRolePolicies" - "iam:PassRole" - "kms:Decrypt" - "lambda:CreateFunction" - "lambda:DeleteFunction" - "lambda:GetFunction" - "lambda:InvokeFunction" - "lambda:UpdateFunctionCode" - "lambda:UpdateFunctionConfiguration" - "logs:CreateLogGroup" - "logs:CreateLogStream" - "logs:PutLogEvents" - "s3:GetObject" - "secretsmanager:GetSecretValue" - "sts:AssumeRole" Resource: "*" Outputs: ExecutionRoleArn: Value: Fn::GetAtt: ExecutionRole.Arn