Skip to content

Commit

Permalink
GITBOOK-698: No subject
Browse files Browse the repository at this point in the history
  • Loading branch information
carlospolop authored and gitbook-bot committed Oct 17, 2024
1 parent f1d5875 commit 09a1528
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions pentesting-cloud/aws-security/aws-services/aws-kms-enum.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,9 +42,9 @@ These defines **who can use and access a key in KMS**.

By **default:**

* It gives the **AWS account that owns the KMS key full access** to the KMS key.
* It gives the **IAM of the** **AWS account that owns the KMS key access** to manage the access to the KMS key via IAM.

Unlike other AWS resource policies, a AWS **KMS key policy does not automatically give permission to the account or any of its users**. To give permission to account administrators, the **key policy must include an explicit statement** that provides this permission, like this one.
Unlike other AWS resource policies, a AWS **KMS key policy does not automatically give permission any of the principals of the account**. To give permission to account administrators, the **key policy must include an explicit statement** that provides this permission, like this one.

* Without allowing the account(`"AWS": "arn:aws:iam::111122223333:root"`) IAM permissions won't work.
* It **allows the account to use IAM policies** to allow access to the KMS key, in addition to the key policy.
Expand Down

0 comments on commit 09a1528

Please sign in to comment.