Service control policies (SCPs) for AWS Chatbot
Service control policies (SCPs) are a type of organization policy that you can use to manage permissions in your organization. SCPs offer central control over the maximum available permissions for the IAM users and IAM roles in your organization. For more information, Service control policies (SCPs) in the AWS Organizations User Guide.
SCPs in AWS Chatbot function similarly to channel guardrail policies, but are implemented on the organization level.
You can use SCPs to secure your organizations by restricting what APIs can be used to configure AWS Chatbot and which services and operations can be run using AWS Chatbot in chat channels.
This doesn’t impact resources that are already created or the ability to respond to commands in chat channels. The global condition key, aws:ChatbotSourceArn
,
is attached to all sessions created through AWS Chatbot. You can use this condition key to restrict which AWS Chatbot API operations can be run using AWS Chatbot as opposed to other platforms such as the CLI or console.
Example Service control policies
Example 1: Deny all IAM operations
The following SCP denies all IAM operations invoked through all AWS Chatbot configurations.
{ "Effect": "Deny", "Action": "iam:*", "Resource": "*", "Condition": { "ArnLike": { "aws:ChatbotSourceArn": "arn:aws:chatbot::*" } } }
Example 2: Deny S3 bucket put requests from a specified Slack channel
The following SCP denies S3 put requests on the specified bucket for all requests originating from a Slack channel.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "ExampleS3Deny", "Effect": "Deny", "Action": "s3:PutObject", "Resource": "arn:aws:s3:::DOC-EXAMPLE-BUCKET/*", "Condition": { "StringLike": { "aws:ChatbotSourceArn": "arn:aws:chatbot::*:chat-configuration/slack-channel/*" } } } ] }