You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.combined_policy_block](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
117
+
|[aws_iam_policy_document.deny_all_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
106
118
107
119
## Inputs
108
120
109
121
| Name | Description | Type | Default | Required |
| allowed\_regions | AWS Regions allowed for use (for use with the restrict regions SCP) |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
112
-
| deny\_all | If false, create a combined policy. If true, deny all access |`bool`|`false`| no |
113
-
| deny\_creating\_iam\_users | DenyCreatingIAMUsers in the OU policy. |`bool`|`false`| no |
114
-
| deny\_deleting\_cloudwatch\_logs | DenyDeletingCloudwatchLogs in the OU policy. |`bool`|`false`| no |
115
-
| deny\_deleting\_kms\_keys | DenyDeletingKMSKeys in the OU policy. |`bool`|`false`| no |
116
-
| deny\_deleting\_route53\_zones | DenyDeletingRoute53Zones in the OU policy. |`bool`|`false`| no |
117
-
| deny\_leaving\_orgs | DenyLeavingOrgs in the OU policy. |`bool`|`false`| no |
118
-
| deny\_root\_account | DenyRootAccount in the OU policy. |`bool`|`false`| no |
119
-
| deny\_s3\_bucket\_public\_access\_resources | S3 bucket resource ARNs to block public access |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
120
-
| deny\_s3\_buckets\_public\_access | DenyS3BucketsPublicAccess in the OU policy. |`bool`|`false`| no |
121
-
| limit\_regions | LimitRegions in the OU policy. |`bool`|`false`| no |
122
-
| protect\_iam\_role\_resources | IAM role resource ARNs to protect from modification and deletion |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
123
-
| protect\_iam\_roles | ProtectIAMRoles in the OU policy. |`bool`|`false`| no |
124
-
| protect\_s3\_bucket\_resources | S3 bucket resource ARNs to protect from bucket and object deletion |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
125
-
| protect\_s3\_buckets | ProtectS3Buckets in the OU policy. |`bool`|`false`| no |
126
-
| require\_s3\_encryption | DenyIncorrectEncryptionHeader and DenyUnEncryptedObjectUploads in the OU policy |`bool`|`false`| no |
127
-
|target | OU resource to attach SCP | <pre>object({<br> name = string<br> id = string<br> })</pre>|n/a|yes|
128
-
|tags | Tags to attach to the SCP policy resource |`map(string)`| <pre>[]</pre> |no|
123
+
|<aname="input_allowed_regions"></a> [allowed\_regions](#input\_allowed\_regions)| AWS Regions allowed for use (for use with the restrict regions SCP) |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
124
+
|<aname="input_deny_all"></a> [deny\_all](#input\_deny\_all)| If false, create a combined policy. If true, deny all access |`bool`|`false`| no |
125
+
|<aname="input_deny_creating_iam_users"></a> [deny\_creating\_iam\_users](#input\_deny\_creating\_iam\_users)| DenyCreatingIAMUsers in the OU policy. |`bool`|`false`| no |
126
+
|<aname="input_deny_deleting_cloudwatch_logs"></a> [deny\_deleting\_cloudwatch\_logs](#input\_deny\_deleting\_cloudwatch\_logs)| DenyDeletingCloudwatchLogs in the OU policy. |`bool`|`false`| no |
127
+
|<aname="input_deny_deleting_kms_keys"></a> [deny\_deleting\_kms\_keys](#input\_deny\_deleting\_kms\_keys)| DenyDeletingKMSKeys in the OU policy. |`bool`|`false`| no |
128
+
|<aname="input_deny_deleting_route53_zones"></a> [deny\_deleting\_route53\_zones](#input\_deny\_deleting\_route53\_zones)| DenyDeletingRoute53Zones in the OU policy. |`bool`|`false`| no |
129
+
|<aname="input_deny_leaving_orgs"></a> [deny\_leaving\_orgs](#input\_deny\_leaving\_orgs)| DenyLeavingOrgs in the OU policy. |`bool`|`false`| no |
130
+
|<aname="input_deny_root_account"></a> [deny\_root\_account](#input\_deny\_root\_account)| DenyRootAccount in the OU policy. |`bool`|`false`| no |
131
+
|<aname="input_deny_s3_bucket_public_access_resources"></a> [deny\_s3\_bucket\_public\_access\_resources](#input\_deny\_s3\_bucket\_public\_access\_resources)| S3 bucket resource ARNs to block public access |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
132
+
|<aname="input_deny_s3_buckets_public_access"></a> [deny\_s3\_buckets\_public\_access](#input\_deny\_s3\_buckets\_public\_access)| DenyS3BucketsPublicAccess in the OU policy. |`bool`|`false`| no |
133
+
|<aname="input_limit_regions"></a> [limit\_regions](#input\_limit\_regions)| LimitRegions in the OU policy. |`bool`|`false`| no |
134
+
|<aname="input_protect_iam_role_resources"></a> [protect\_iam\_role\_resources](#input\_protect\_iam\_role\_resources)| IAM role resource ARNs to protect from modification and deletion |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
135
+
|<aname="input_protect_iam_roles"></a> [protect\_iam\_roles](#input\_protect\_iam\_roles)| ProtectIAMRoles in the OU policy. |`bool`|`false`| no |
136
+
|<aname="input_protect_s3_bucket_resources"></a> [protect\_s3\_bucket\_resources](#input\_protect\_s3\_bucket\_resources)| S3 bucket resource ARNs to protect from bucket and object deletion |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
137
+
|<aname="input_protect_s3_buckets"></a> [protect\_s3\_buckets](#input\_protect\_s3\_buckets)| ProtectS3Buckets in the OU policy. |`bool`|`false`| no |
138
+
|<aname="input_require_s3_encryption"></a> [require\_s3\_encryption](#input\_require\_s3\_encryption)| DenyIncorrectEncryptionHeader and DenyUnEncryptedObjectUploads in the OU policy |`bool`|`false`| no |
139
+
|<aname="input_tags"></a> [tags](#input\_tags)| Tags applied to the SCP policy |`map(string)`|`{}`|no|
140
+
|<aname="input_target"></a> [target](#input\_target)| OU resource to attach SCP | <pre>object({<br> name = string<br> id = string<br> })</pre> |n/a | yes|
0 commit comments