@k9securityio/k9-cdk
Version:
Provision strong AWS security policies easily using the AWS CDK.
141 lines • 23.5 kB
JavaScript
;
var _a;
Object.defineProperty(exports, "__esModule", { value: true });
exports.CloudFrontOACReadAccessGenerator = exports.SID_DENY_EVERYONE_ELSE = exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = void 0;
exports.makeKeyPolicy = makeKeyPolicy;
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
const iam = require("aws-cdk-lib/aws-iam");
const aws_iam_1 = require("aws-cdk-lib/aws-iam");
const k9policy_1 = require("./k9policy");
let SUPPORTED_CAPABILITIES = new Array(k9policy_1.AccessCapability.ADMINISTER_RESOURCE, k9policy_1.AccessCapability.READ_CONFIG, k9policy_1.AccessCapability.READ_DATA, k9policy_1.AccessCapability.WRITE_DATA, k9policy_1.AccessCapability.DELETE_DATA);
exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = 'Allow Root User to Administer Key And Identity Policies';
exports.SID_DENY_EVERYONE_ELSE = 'DenyEveryoneElse';
/**
* Generate key policy statements to enable the CloudFront service to read encrypted S3 bucket object data (only)
* from within a <a href="https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html#sse-kms">CloudFront OAC integration</a>.
*/
class CloudFrontOACReadAccessGenerator {
constructor(distributionArn) {
this.distributionArn = distributionArn;
}
makeAllowStatements() {
return [new aws_iam_1.PolicyStatement({
sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA,
effect: aws_iam_1.Effect.ALLOW,
principals: [new aws_iam_1.ServicePrincipal('cloudfront.amazonaws.com')],
actions: ['kms:Decrypt'],
resources: ['*'],
conditions: {
StringEquals: { 'aws:SourceArn': this.distributionArn },
},
}),
new aws_iam_1.PolicyStatement({
sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA,
effect: aws_iam_1.Effect.ALLOW,
principals: [new aws_iam_1.AnyPrincipal()],
actions: ['kms:Decrypt'],
resources: ['*'],
conditions: {
// use ArnEquals condition instead of a plain Principal element in case
// the CloudFront service recreates the role.
// conditions bind against the principal ARN at runtime.
// the principal element binds (once) to the principal's canonical userid at policy definition time.
ArnEquals: {
'aws:PrincipalArn': 'arn:aws:iam::856369053181:role/OriginAccessControlRole',
},
},
})];
}
makeConditionsToExceptFromDenyEveryoneElse() {
// return a (TypeScript) Record of the form:
// {"Operator": { "keyInRequestContext": "value" } }
return { StringNotEqualsIfExists: { 'aws:PrincipalServiceName': 'cloudfront.amazonaws.com' } };
}
}
exports.CloudFrontOACReadAccessGenerator = CloudFrontOACReadAccessGenerator;
_a = JSII_RTTI_SYMBOL_1;
CloudFrontOACReadAccessGenerator[_a] = { fqn: "@k9securityio/k9-cdk.kms.CloudFrontOACReadAccessGenerator", version: "2.2.1" };
CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA = 'Allow CloudFront Service read-data';
CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA = 'Allow CloudFront IAM role read-data';
function makeKeyPolicy(props) {
const policyFactory = new k9policy_1.K9PolicyFactory();
const policy = new iam.PolicyDocument();
const resourceArns = ['*'];
let accessSpecsByCapabilityRecs = policyFactory.mergeDesiredAccessSpecsByCapability(SUPPORTED_CAPABILITIES, props.k9DesiredAccess);
let accessSpecsByCapability = new Map();
for (let [capabilityStr, accessSpec] of Object.entries(accessSpecsByCapabilityRecs)) {
accessSpecsByCapability.set((0, k9policy_1.getAccessCapabilityFromValue)(capabilityStr), accessSpec);
}
if (!(0, k9policy_1.canPrincipalsManageResources)(accessSpecsByCapability)) {
throw Error('At least one principal must be able to administer and read-config for keys' +
' so encrypted data remains accessible; found:\n' +
`administer-resource: '${accessSpecsByCapability.get(k9policy_1.AccessCapability.ADMINISTER_RESOURCE)?.allowPrincipalArns}'\n` +
`read-config: '${accessSpecsByCapability.get(k9policy_1.AccessCapability.READ_CONFIG)?.allowPrincipalArns}'`);
}
const allowStatements = policyFactory.makeAllowStatements('KMS', SUPPORTED_CAPABILITIES, Array.from(accessSpecsByCapability.values()), resourceArns);
policy.addStatements(...allowStatements);
if (props.awsServiceAccessGenerators) {
for (let serviceAccessSpec of props.awsServiceAccessGenerators) {
policy.addStatements(...serviceAccessSpec.makeAllowStatements());
}
}
//console.log(`trustAccountIdentities: ${props.trustAccountIdentities}`);
// Allow root user and control access via Identity policy by aligning to Key's behavior:
if (props.trustAccountIdentities) {
//console.log('Adding Allow root and DenyEveryoneElse statements');
const denyEveryoneElseStatement = new aws_iam_1.PolicyStatement({
sid: exports.SID_DENY_EVERYONE_ELSE,
effect: aws_iam_1.Effect.DENY,
principals: policyFactory.makeDenyEveryoneElsePrincipals(),
actions: ['kms:*'],
resources: resourceArns,
});
denyEveryoneElseStatement.addCondition('Bool', {
'aws:PrincipalIsAWSService': ['false'],
'kms:GrantIsForAWSResource': ['false'],
});
const denyEveryoneElseTest = policyFactory.wasLikeUsed(props.k9DesiredAccess) ?
'ArnNotLike' :
'ArnNotEquals';
const allAllowedPrincipalArns = policyFactory.getAllowedPrincipalArns(props.k9DesiredAccess);
const accountRootPrincipal = new aws_iam_1.AccountRootPrincipal();
denyEveryoneElseStatement.addCondition(denyEveryoneElseTest, {
'aws:PrincipalArn': [
// Place Root Principal arn in stable, prominent position;
// will render as an object Fn::Join'ing Partition & AccountId
accountRootPrincipal.arn,
...allAllowedPrincipalArns,
],
});
policy.addStatements(
// add AllowRootUserToAdministerKey statement and enable access granted via Identity policies
new aws_iam_1.PolicyStatement({
sid: exports.SID_ALLOW_ROOT_AND_IDENTITY_POLICIES,
effect: aws_iam_1.Effect.ALLOW,
principals: [accountRootPrincipal],
actions: ['kms:*'],
resources: resourceArns,
}), denyEveryoneElseStatement);
}
else {
// Omit Allow Root & DenyEveryoneElse statement
//
// Instead, implement least privilege by relying on KMS' special behavior that
// enables granting access solely via a KMS key policy, *irrespective of* Identity policy.
//
// See: https://docs.aws.amazon.com/kms/latest/developerguide/control-access-overview.html#managing-access
// "To allow access to a KMS key, you must use the key policy,
// *either alone* or in combination with IAM policies or grants.
// IAM policies by themselves are not sufficient to allow access to a KMS key,
// though you can use them in combination with a key policy."
//
//console.log('Omitting Allow root and DenyEveryoneElse statements');
}
const denyUntrustedOrgsStatement = policyFactory._makeDenyUntrustedOrgsStatement('KMS', SUPPORTED_CAPABILITIES, accessSpecsByCapability, resourceArns);
if (denyUntrustedOrgsStatement) {
policy.addStatements(denyUntrustedOrgsStatement);
}
policy.validateForResourcePolicy();
return policy;
}
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"kms.js","sourceRoot":"","sources":["../src/kms.ts"],"names":[],"mappings":";;;;AA6FA,sCAoGC;;AAjMD,2CAA2C;AAC3C,iDAO6B;AAC7B,yCAOoB;AAcpB,IAAI,sBAAsB,GAAG,IAAI,KAAK,CACpC,2BAAgB,CAAC,mBAAmB,EACpC,2BAAgB,CAAC,WAAW,EAC5B,2BAAgB,CAAC,SAAS,EAC1B,2BAAgB,CAAC,UAAU,EAC3B,2BAAgB,CAAC,WAAW,CAC7B,CAAC;AAEW,QAAA,oCAAoC,GAAG,yDAAyD,CAAC;AACjG,QAAA,sBAAsB,GAAG,kBAAkB,CAAC;AAEzD;;;GAGG;AACH,MAAa,gCAAgC;IAO3C,YAAY,eAAuB;QACjC,IAAI,CAAC,eAAe,GAAG,eAAe,CAAC;IACzC,CAAC;IAED,mBAAmB;QACjB,OAAO,CAAC,IAAI,yBAAe,CAAC;gBAC1B,GAAG,EAAE,gCAAgC,CAAC,kCAAkC;gBACxE,MAAM,EAAE,gBAAM,CAAC,KAAK;gBACpB,UAAU,EAAE,CAAC,IAAI,0BAAgB,CAAC,0BAA0B,CAAC,CAAC;gBAC9D,OAAO,EAAE,CAAC,aAAa,CAAC;gBACxB,SAAS,EAAE,CAAC,GAAG,CAAC;gBAChB,UAAU,EAAE;oBACV,YAAY,EAAE,EAAE,eAAe,EAAE,IAAI,CAAC,eAAe,EAAE;iBACxD;aACF,CAAC;YACF,IAAI,yBAAe,CAAC;gBAClB,GAAG,EAAE,gCAAgC,CAAC,uCAAuC;gBAC7E,MAAM,EAAE,gBAAM,CAAC,KAAK;gBACpB,UAAU,EAAE,CAAC,IAAI,sBAAY,EAAE,CAAC;gBAChC,OAAO,EAAE,CAAC,aAAa,CAAC;gBACxB,SAAS,EAAE,CAAC,GAAG,CAAC;gBAChB,UAAU,EAAE;oBACV,uEAAuE;oBACvE,6CAA6C;oBAC7C,wDAAwD;oBACxD,oGAAoG;oBACpG,SAAS,EAAE;wBACT,kBAAkB,EAAE,wDAAwD;qBAC7E;iBACF;aACF,CAAC,CAAC,CAAC;IACN,CAAC;IAED,0CAA0C;QACxC,4CAA4C;QAC5C,wDAAwD;QACxD,OAAO,EAAE,uBAAuB,EAAE,EAAE,0BAA0B,EAAE,0BAA0B,EAAE,EAAE,CAAC;IACjG,CAAC;;AA5CH,4EA6CC;;;AA3CiB,mEAAkC,GAAG,oCAAoC,CAAC;AAC1E,wEAAuC,GAAG,qCAAqC,CAAC;AA6ClG,SAAgB,aAAa,CAAC,KAAuB;IACnD,MAAM,aAAa,GAAG,IAAI,0BAAe,EAAE,CAAC;IAC5C,MAAM,MAAM,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE,CAAC;IAExC,MAAM,YAAY,GAAG,CAAC,GAAG,CAAC,CAAC;IAE3B,IAAI,2BAA2B,GAAG,aAAa,CAAC,mCAAmC,CAAC,sBAAsB,EAAE,KAAK,CAAC,eAAe,CAAC,CAAC;IACnI,IAAI,uBAAuB,GAAuC,IAAI,GAAG,EAAE,CAAC;IAE5E,KAAK,IAAI,CAAC,aAAa,EAAE,UAAU,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,2BAA2B,CAAC,EAAE,CAAC;QACpF,uBAAuB,CAAC,GAAG,CAAC,IAAA,uCAA4B,EAAC,aAAa,CAAC,EAAE,UAAU,CAAC,CAAC;IACvF,CAAC;IAED,IAAI,CAAC,IAAA,uCAA4B,EAAC,uBAAuB,CAAC,EAAE,CAAC;QAC3D,MAAM,KAAK,CAAC,4EAA4E;YAChF,iDAAiD;YACjD,yBAAyB,uBAAuB,CAAC,GAAG,CAAC,2BAAgB,CAAC,mBAAmB,CAAC,EAAE,kBAAkB,KAAK;YACnH,iBAAiB,uBAAuB,CAAC,GAAG,CAAC,2BAAgB,CAAC,WAAW,CAAC,EAAE,kBAAkB,GAAG,CACxG,CAAC;IACJ,CAAC;IAED,MAAM,eAAe,GAAG,aAAa,CAAC,mBAAmB,CAAC,KAAK,EAC7D,sBAAsB,EACtB,KAAK,CAAC,IAAI,CAAC,uBAAuB,CAAC,MAAM,EAAE,CAAC,EAC5C,YAAY,CAAC,CAAC;IAChB,MAAM,CAAC,aAAa,CAAC,GAAG,eAAe,CAAC,CAAC;IAEzC,IAAI,KAAK,CAAC,0BAA0B,EAAE,CAAC;QACrC,KAAK,IAAI,iBAAiB,IAAI,KAAK,CAAC,0BAA0B,EAAE,CAAC;YAC/D,MAAM,CAAC,aAAa,CAAC,GAAG,iBAAiB,CAAC,mBAAmB,EAAE,CAAC,CAAC;QACnE,CAAC;IACH,CAAC;IAED,yEAAyE;IAEzE,wFAAwF;IACxF,IAAI,KAAK,CAAC,sBAAsB,EAAE,CAAC;QACjC,mEAAmE;QACnE,MAAM,yBAAyB,GAAG,IAAI,yBAAe,CAAC;YACpD,GAAG,EAAE,8BAAsB;YAC3B,MAAM,EAAE,gBAAM,CAAC,IAAI;YACnB,UAAU,EAAE,aAAa,CAAC,8BAA8B,EAAE;YAC1D,OAAO,EAAE,CAAC,OAAO,CAAC;YAClB,SAAS,EAAE,YAAY;SACxB,CAAC,CAAC;QACH,yBAAyB,CAAC,YAAY,CAAC,MAAM,EAAE;YAC7C,2BAA2B,EAAE,CAAC,OAAO,CAAC;YACtC,2BAA2B,EAAE,CAAC,OAAO,CAAC;SACvC,CAAC,CAAC;QACH,MAAM,oBAAoB,GAAG,aAAa,CAAC,WAAW,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC;YAC7E,YAAY,CAAC,CAAC;YACd,cAAc,CAAC;QACjB,MAAM,uBAAuB,GAAG,aAAa,CAAC,uBAAuB,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAC7F,MAAM,oBAAoB,GAAG,IAAI,8BAAoB,EAAE,CAAC;QACxD,yBAAyB,CAAC,YAAY,CAAC,oBAAoB,EAAE;YAC3D,kBAAkB,EAAE;gBAClB,0DAA0D;gBAC1D,8DAA8D;gBAC9D,oBAAoB,CAAC,GAAG;gBACxB,GAAG,uBAAuB;aAC3B;SACF,CAAC,CAAC;QAEH,MAAM,CAAC,aAAa;QAClB,6FAA6F;QAC7F,IAAI,yBAAe,CAAC;YAClB,GAAG,EAAE,4CAAoC;YACzC,MAAM,EAAE,gBAAM,CAAC,KAAK;YACpB,UAAU,EAAE,CAAC,oBAAoB,CAAC;YAClC,OAAO,EAAE,CAAC,OAAO,CAAC;YAClB,SAAS,EAAE,YAAY;SACxB,CAAC,EACA,yBAAyB,CAC5B,CAAC;IACJ,CAAC;SAAM,CAAC;QAEN,+CAA+C;QAC/C,EAAE;QACF,8EAA8E;QAC9E,0FAA0F;QAC1F,EAAE;QACF,0GAA0G;QAC1G,8DAA8D;QAC9D,iEAAiE;QACjE,+EAA+E;QAC/E,8DAA8D;QAC9D,EAAE;QAEF,qEAAqE;IACvE,CAAC;IAED,MAAM,0BAA0B,GAAG,aAAa,CAAC,+BAA+B,CAC9E,KAAK,EAAE,sBAAsB,EAAE,uBAAuB,EAAE,YAAY,CAAC,CAAC;IACxE,IAAI,0BAA0B,EAAE,CAAC;QAC/B,MAAM,CAAC,aAAa,CAAC,0BAA0B,CAAC,CAAC;IACnD,CAAC;IAED,MAAM,CAAC,yBAAyB,EAAE,CAAC;IAEnC,OAAO,MAAM,CAAC;AAChB,CAAC","sourcesContent":["import * as iam from 'aws-cdk-lib/aws-iam';\nimport {\n  AccountRootPrincipal, AnyPrincipal,\n  Conditions,\n  Effect,\n  PolicyDocument,\n  PolicyStatement,\n  ServicePrincipal,\n} from 'aws-cdk-lib/aws-iam';\nimport {\n  AccessCapability,\n  canPrincipalsManageResources,\n  getAccessCapabilityFromValue,\n  IAccessSpec,\n  IAWSServiceAccessGenerator,\n  K9PolicyFactory,\n} from './k9policy';\n\nexport interface K9KeyPolicyProps {\n  readonly k9DesiredAccess: Array<IAccessSpec>;\n  readonly trustAccountIdentities?: boolean;\n  /**\n   * An (optional) array of IAWSServiceAccessGenerator instances which will generate statements to allow access to the\n   * key by an AWS service like CloudFront or Kinesis.\n   *\n   * @default undefined\n   */\n  readonly awsServiceAccessGenerators?: Array<IAWSServiceAccessGenerator>;\n}\n\nlet SUPPORTED_CAPABILITIES = new Array<AccessCapability>(\n  AccessCapability.ADMINISTER_RESOURCE,\n  AccessCapability.READ_CONFIG,\n  AccessCapability.READ_DATA,\n  AccessCapability.WRITE_DATA,\n  AccessCapability.DELETE_DATA,\n);\n\nexport const SID_ALLOW_ROOT_AND_IDENTITY_POLICIES = 'Allow Root User to Administer Key And Identity Policies';\nexport const SID_DENY_EVERYONE_ELSE = 'DenyEveryoneElse';\n\n/**\n * Generate key policy statements to enable the CloudFront service to read encrypted S3 bucket object data (only)\n * from within a <a href=\"https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html#sse-kms\">CloudFront OAC integration</a>.\n */\nexport class CloudFrontOACReadAccessGenerator implements IAWSServiceAccessGenerator {\n\n  static readonly SID_ALLOW_CLOUDFRONT_SVC_READ_DATA = 'Allow CloudFront Service read-data';\n  static readonly SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA = 'Allow CloudFront IAM role read-data';\n\n  readonly distributionArn: string;\n\n  constructor(distributionArn: string) {\n    this.distributionArn = distributionArn;\n  }\n\n  makeAllowStatements(): Array<PolicyStatement> {\n    return [new PolicyStatement({\n      sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_SVC_READ_DATA,\n      effect: Effect.ALLOW,\n      principals: [new ServicePrincipal('cloudfront.amazonaws.com')],\n      actions: ['kms:Decrypt'],\n      resources: ['*'],\n      conditions: {\n        StringEquals: { 'aws:SourceArn': this.distributionArn },\n      },\n    }),\n    new PolicyStatement({\n      sid: CloudFrontOACReadAccessGenerator.SID_ALLOW_CLOUDFRONT_IAM_ROLE_READ_DATA,\n      effect: Effect.ALLOW,\n      principals: [new AnyPrincipal()],\n      actions: ['kms:Decrypt'],\n      resources: ['*'],\n      conditions: {\n        // use ArnEquals condition instead of a plain Principal element in case\n        // the CloudFront service recreates the role.\n        // conditions bind against the principal ARN at runtime.\n        // the principal element binds (once) to the principal's canonical userid at policy definition time.\n        ArnEquals: {\n          'aws:PrincipalArn': 'arn:aws:iam::856369053181:role/OriginAccessControlRole',\n        },\n      },\n    })];\n  }\n\n  makeConditionsToExceptFromDenyEveryoneElse(): Conditions {\n    // return a (TypeScript) Record of the form:\n    //     {\"Operator\": { \"keyInRequestContext\": \"value\" } }\n    return { StringNotEqualsIfExists: { 'aws:PrincipalServiceName': 'cloudfront.amazonaws.com' } };\n  }\n}\n\n\nexport function makeKeyPolicy(props: K9KeyPolicyProps): PolicyDocument {\n  const policyFactory = new K9PolicyFactory();\n  const policy = new iam.PolicyDocument();\n\n  const resourceArns = ['*'];\n\n  let accessSpecsByCapabilityRecs = policyFactory.mergeDesiredAccessSpecsByCapability(SUPPORTED_CAPABILITIES, props.k9DesiredAccess);\n  let accessSpecsByCapability: Map<AccessCapability, IAccessSpec> = new Map();\n\n  for (let [capabilityStr, accessSpec] of Object.entries(accessSpecsByCapabilityRecs)) {\n    accessSpecsByCapability.set(getAccessCapabilityFromValue(capabilityStr), accessSpec);\n  }\n\n  if (!canPrincipalsManageResources(accessSpecsByCapability)) {\n    throw Error('At least one principal must be able to administer and read-config for keys' +\n            ' so encrypted data remains accessible; found:\\n' +\n            `administer-resource: '${accessSpecsByCapability.get(AccessCapability.ADMINISTER_RESOURCE)?.allowPrincipalArns}'\\n` +\n            `read-config: '${accessSpecsByCapability.get(AccessCapability.READ_CONFIG)?.allowPrincipalArns}'`,\n    );\n  }\n\n  const allowStatements = policyFactory.makeAllowStatements('KMS',\n    SUPPORTED_CAPABILITIES,\n    Array.from(accessSpecsByCapability.values()),\n    resourceArns);\n  policy.addStatements(...allowStatements);\n\n  if (props.awsServiceAccessGenerators) {\n    for (let serviceAccessSpec of props.awsServiceAccessGenerators) {\n      policy.addStatements(...serviceAccessSpec.makeAllowStatements());\n    }\n  }\n\n  //console.log(`trustAccountIdentities: ${props.trustAccountIdentities}`);\n\n  // Allow root user and control access via Identity policy by aligning to Key's behavior:\n  if (props.trustAccountIdentities) {\n    //console.log('Adding Allow root and DenyEveryoneElse statements');\n    const denyEveryoneElseStatement = new PolicyStatement({\n      sid: SID_DENY_EVERYONE_ELSE,\n      effect: Effect.DENY,\n      principals: policyFactory.makeDenyEveryoneElsePrincipals(),\n      actions: ['kms:*'],\n      resources: resourceArns,\n    });\n    denyEveryoneElseStatement.addCondition('Bool', {\n      'aws:PrincipalIsAWSService': ['false'],\n      'kms:GrantIsForAWSResource': ['false'],\n    });\n    const denyEveryoneElseTest = policyFactory.wasLikeUsed(props.k9DesiredAccess) ?\n      'ArnNotLike' :\n      'ArnNotEquals';\n    const allAllowedPrincipalArns = policyFactory.getAllowedPrincipalArns(props.k9DesiredAccess);\n    const accountRootPrincipal = new AccountRootPrincipal();\n    denyEveryoneElseStatement.addCondition(denyEveryoneElseTest, {\n      'aws:PrincipalArn': [\n        // Place Root Principal arn in stable, prominent position;\n        // will render as an object Fn::Join'ing Partition & AccountId\n        accountRootPrincipal.arn,\n        ...allAllowedPrincipalArns,\n      ],\n    });\n\n    policy.addStatements(\n      // add AllowRootUserToAdministerKey statement and enable access granted via Identity policies\n      new PolicyStatement({\n        sid: SID_ALLOW_ROOT_AND_IDENTITY_POLICIES,\n        effect: Effect.ALLOW,\n        principals: [accountRootPrincipal],\n        actions: ['kms:*'],\n        resources: resourceArns,\n      })\n      , denyEveryoneElseStatement,\n    );\n  } else {\n\n    // Omit Allow Root & DenyEveryoneElse statement\n    //\n    // Instead, implement least privilege by relying on KMS' special behavior that\n    // enables granting access solely via a KMS key policy, *irrespective of* Identity policy.\n    //\n    // See: https://docs.aws.amazon.com/kms/latest/developerguide/control-access-overview.html#managing-access\n    // \"To allow access to a KMS key, you must use the key policy,\n    //  *either alone* or in combination with IAM policies or grants.\n    //  IAM policies by themselves are not sufficient to allow access to a KMS key,\n    //  though you can use them in combination with a key policy.\"\n    //\n\n    //console.log('Omitting Allow root and DenyEveryoneElse statements');\n  }\n\n  const denyUntrustedOrgsStatement = policyFactory._makeDenyUntrustedOrgsStatement(\n    'KMS', SUPPORTED_CAPABILITIES, accessSpecsByCapability, resourceArns);\n  if (denyUntrustedOrgsStatement) {\n    policy.addStatements(denyUntrustedOrgsStatement);\n  }\n\n  policy.validateForResourcePolicy();\n\n  return policy;\n}\n"]}