8000 Add condition for sts:AssumeRole of the lambda principal to be from within the correct source account by gligorkot · Pull Request #13125 · serverless/serverless · GitHub
[go: up one dir, main page]

Skip to content

Conversation

@gligorkot
Copy link

This PR implements the change to update the default IAM Lambda execution role, by adding a condition that the assumer of the role comes from within the same AWS Account that the role is deployed in. From a security point of view this seems like a good idea for this to be the default option.

Closes: #13124

@github-actions
Copy link
github-actions bot commented Sep 25, 2025

All contributors have signed the CLA ✍️ ✅
Posted by the CLA Assistant Lite bot.

@gligorkot
Copy link
Author

I have read the CLA Document and I hereby sign the CLA

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add Condition to the Trust Relationship of IAM Role to be from the same account

1 participant

0