From 56319fc35b915d75247ac1917a01396c2d3539ba Mon Sep 17 00:00:00 2001 From: Kevin Schwarz Date: Tue, 22 Dec 2020 10:29:24 -0500 Subject: [PATCH] Update S3Retain.yaml Security is job 0, better not to create public buckets --- .../S3Retain.yaml | 25 +++---------------- 1 file changed, 3 insertions(+), 22 deletions(-) diff --git a/Labs/CodePipelineWithManualApproval/S3Retain.yaml b/Labs/CodePipelineWithManualApproval/S3Retain.yaml index 4e6e34e..3d5fb21 100644 --- a/Labs/CodePipelineWithManualApproval/S3Retain.yaml +++ b/Labs/CodePipelineWithManualApproval/S3Retain.yaml @@ -1,31 +1,12 @@ AWSTemplateFormatVersion: 2010-09-09 Description: >- - AWS CloudFormation Sample Template S3_Website_Bucket_With_Retain_On_Delete: - Sample template showing how to create a publicly accessible S3 bucket - configured for website access with a deletion policy of retail on delete. + AWS CloudFormation Sample Template S3_Bucket_With_Retain_On_Delete: + Sample template showing how to create a S3 bucket + with a deletion policy of retail on delete. **WARNING** This template creates an S3 bucket that will NOT be deleted when the stack is deleted. You will be billed for the AWS resources used if you create a stack from this template. Resources: S3Bucket: Type: 'AWS::S3::Bucket' - Properties: - AccessControl: PublicRead - WebsiteConfiguration: - IndexDocument: index.html - ErrorDocument: error.html DeletionPolicy: Retain -Outputs: - WebsiteURL: - Value: !GetAtt - - S3Bucket - - WebsiteURL - Description: URL for website hosted on S3 - S3BucketSecureURL: - Value: !Join - - '' - - - 'https://' - - !GetAtt - - S3Bucket - - DomainName - Description: Name of S3 bucket to hold website content \ No newline at end of file