CfnDRTAccessProps
- class aws_cdk.aws_shield.CfnDRTAccessProps(*, role_arn, log_bucket_list=None)
Bases:
object
Properties for defining a
CfnDRTAccess
.- Parameters:
role_arn (
str
) – Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and logs and to create or update AWS WAF rules and web ACLs. You can associate only oneRoleArn
with your subscription. If you submit this update for an account that already has an associated role, the newRoleArn
will replace the existingRoleArn
. This change requires the following: - You must be subscribed to the Business Support plan or the Enterprise Support plan . - You must have theiam:PassRole
permission. For more information, see Granting a user permissions to pass a role to an AWS service . - TheAWSShieldDRTAccessPolicy
managed policy must be attached to the role that you specify in the request. You can access this policy in the IAM console at AWSShieldDRTAccessPolicy . For information, see Adding and removing IAM identity permissions . - The role must trust the service principaldrt.shield.amazonaws.com
. For information, see IAM JSON policy elements: Principal . The SRT will have access only to your AWS WAF and Shield resources. By submitting this request, you provide permissions to the SRT to inspect your AWS WAF and Shield configuration and logs, and to create and update AWS WAF rules and web ACLs on your behalf. The SRT takes these actions only if explicitly authorized by you.log_bucket_list (
Optional
[Sequence
[str
]]) –Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription. Use this to share information with the SRT that’s not available in AWS WAF logs. To use the services of the SRT, you must be subscribed to the Business Support plan or the Enterprise Support plan .
- Link:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-shield-drtaccess.html
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. import aws_cdk.aws_shield as shield cfn_dRTAccess_props = shield.CfnDRTAccessProps( role_arn="roleArn", # the properties below are optional log_bucket_list=["logBucketList"] )
Attributes
- log_bucket_list
Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources.
You can associate up to 10 Amazon S3 buckets with your subscription.
Use this to share information with the SRT that’s not available in AWS WAF logs.
To use the services of the SRT, you must be subscribed to the Business Support plan or the Enterprise Support plan .
- role_arn
Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks.
This enables the SRT to inspect your AWS WAF configuration and logs and to create or update AWS WAF rules and web ACLs.
You can associate only one
RoleArn
with your subscription. If you submit this update for an account that already has an associated role, the newRoleArn
will replace the existingRoleArn
.This change requires the following:
You must be subscribed to the Business Support plan or the Enterprise Support plan .
You must have the
iam:PassRole
permission. For more information, see Granting a user permissions to pass a role to an AWS service .The
AWSShieldDRTAccessPolicy
managed policy must be attached to the role that you specify in the request. You can access this policy in the IAM console at AWSShieldDRTAccessPolicy . For information, see Adding and removing IAM identity permissions .The role must trust the service principal
drt.shield.amazonaws.com
. For information, see IAM JSON policy elements: Principal .
The SRT will have access only to your AWS WAF and Shield resources. By submitting this request, you provide permissions to the SRT to inspect your AWS WAF and Shield configuration and logs, and to create and update AWS WAF rules and web ACLs on your behalf. The SRT takes these actions only if explicitly authorized by you.