IAM Permissions Reference
The deploying user/role requires the following AWS permissions:
EKS Permissions:
eks:CreateCluster,eks:DeleteCluster,eks:DescribeCluster,eks:UpdateClusterConfigeks:CreateNodegroup,eks:DeleteNodegroup,eks:DescribeNodegroupeks:CreateAccessEntry,eks:DeleteAccessEntry,eks:AssociateAccessPolicy
S3 Permissions:
s3:CreateBucket,s3:DeleteBucket,s3:PutBucketPolicy,s3:GetBucketPolicys3:PutObject,s3:GetObject,s3:ListBucket(for state and data buckets)
Route53 Permissions:
route53:CreateHealthCheck,route53:DeleteHealthCheck,route53:GetHealthCheck,route53:UpdateHealthCheckroute53:ChangeResourceRecordSets,route53:ListResourceRecordSets
Lambda Permissions (for DR failover automation):
lambda:CreateFunction,lambda:DeleteFunction,lambda:UpdateFunctionCodelambda:AddPermission,lambda:RemovePermission
Additional Permissions:
iam:CreateRole,iam:DeleteRole,iam:AttachRolePolicy,iam:DetachRolePolicysns:CreateTopic,sns:DeleteTopic,sns:Subscribecloudwatch:PutMetricAlarm,cloudwatch:DeleteAlarmskms:CreateKey,kms:Decrypt,kms:Encrypt(for encryption key management)ssm:PutParameter,ssm:GetParameter(for DR failover cooldown persistence)