{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "EnforceNetworkPerimeter",
"Effect": "Deny",
"Principal": "*",
"Action": [
"s3:*",
"sqs:*",
"kms:*",
"secretsmanager:*",
"sts:AssumeRole",
"sts:DecodeAuthorizationMessage",
"sts:GetAccessKeyInfo",
"sts:GetFederationToken",
"sts:GetServiceBearerToken",
"sts:GetSessionToken",
"sts:SetContext"
],
"Resource": "*",
"Condition": {
"NotIpAddressIfExists": {
"aws:SourceIp": "<my-corporate-cidr>"
},
"StringNotEqualsIfExists": {
"aws:SourceVpc": "<my-vpc>",
"aws:PrincipalTag/dp:exclude:network": "true",
"aws:PrincipalAccount": [
"<load-balancing-account-id>",
"<fin-space-account-id>",
"<third-party-account-a>",
"<third-party-account-b>"
],
"aws:ResourceTag/dp:exclude:network": "true"
},
"BoolIfExists": {
"aws:PrincipalIsAWSService": "false",
"aws:ViaAWSService": "false"
},
"ArnNotLikeIfExists": {
"aws:PrincipalArn": [
"arn:aws:iam::*:role/aws:ec2-infrastructure"
]
},
"StringEquals": {
"aws:PrincipalTag/dp:include:network": "true"
}
}
}
]
}