You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_allowed_ec2_instance_types"></a> [allowed\_ec2\_instance\_types](#input\_allowed\_ec2\_instance\_types)| EC2 instances types allowed for use |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
123
129
| <aname="input_allowed_regions"></a> [allowed\_regions](#input\_allowed\_regions)| AWS Regions allowed for use (for use with the restrict regions SCP) |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
124
130
| <aname="input_deny_all"></a> [deny\_all](#input\_deny\_all)| If false, create a combined policy. If true, deny all access |`bool`|`false`| no |
125
131
| <aname="input_deny_creating_iam_users"></a> [deny\_creating\_iam\_users](#input\_deny\_creating\_iam\_users)| DenyCreatingIAMUsers in the OU policy. |`bool`|`false`| no |
@@ -130,6 +136,7 @@ No modules.
130
136
| <aname="input_deny_root_account"></a> [deny\_root\_account](#input\_deny\_root\_account)| DenyRootAccount in the OU policy. |`bool`|`false`| no |
131
137
| <aname="input_deny_s3_bucket_public_access_resources"></a> [deny\_s3\_bucket\_public\_access\_resources](#input\_deny\_s3\_bucket\_public\_access\_resources)| S3 bucket resource ARNs to block public access |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
132
138
| <aname="input_deny_s3_buckets_public_access"></a> [deny\_s3\_buckets\_public\_access](#input\_deny\_s3\_buckets\_public\_access)| DenyS3BucketsPublicAccess in the OU policy. |`bool`|`false`| no |
139
+
| <aname="input_limit_ec2_instance_types"></a> [limit\_ec2\_instance\_types](#input\_limit\_ec2\_instance\_types)| LimitEC2InstanceTypes in the OU policy. |`bool`|`false`| no |
133
140
| <aname="input_limit_regions"></a> [limit\_regions](#input\_limit\_regions)| LimitRegions in the OU policy. |`bool`|`false`| no |
134
141
| <aname="input_protect_iam_role_resources"></a> [protect\_iam\_role\_resources](#input\_protect\_iam\_role\_resources)| IAM role resource ARNs to protect from modification and deletion |`list(string)`| <pre>[<br> ""<br>]</pre> | no |
135
142
| <aname="input_protect_iam_roles"></a> [protect\_iam\_roles](#input\_protect\_iam\_roles)| ProtectIAMRoles in the OU policy. |`bool`|`false`| no |
0 commit comments