Click here to log in to the AWS Management Console, navigate to the IAM service and then to the Policies page to create a policy for the role by updating the related JSON file only, as follows:
Create a new policy.
Navigate to the JSON tab.
Select and delete all of the default text in the JSON file.
Copy script as it is displayed from the UI in your Snyk account and paste it inside the JSON file:
Set AmazonEC2ContainerRegistryReadOnlyForSnyk as the Name.
Enter Provides Snyk with read-only access to Amazon EC2 Container Registry repositories as the Description.
Click Create Policy.
Create a role by which to implement the policy:
From the AWS Management Console again, navigate to the Roles page and create a new role.
Select AWS service as the trusted entity and EC2 as the service for this role.
Click Next: permissions.
From the Policies list that is displayed, search for and select the AmazonEC2ContainerRegistryReadOnlyForSnyk policy you just created.
Skip to the last step (Review) of the process.
Name the role SnykServiceRole, enter Allows EC2 instances to call Snyk AWS services on your behalf as the Description and then Create role.
Harden the usability scope for the role:
Again from the Roles page, find and click the link for the role you just created to update its configurations and navigate to the Trust relationships tab.
Click Edit trust relationship.
In the Policy Document, select and delete the entire script and then copy the following script as it is displayed from the UI in your Snyk account and paste: