AmazonGuardDutyServiceRolePolicy
Description: Enable access to AWS Resources used or managed by Amazon Guard Duty
AmazonGuardDutyServiceRolePolicy
is an AWS managed policy.
Using this policy
This policy is attached to a service-linked role that allows the service to perform actions on your behalf. You cannot attach this policy to your users, groups, or roles.
Policy details
-
Type: Service-linked role policy
-
Creation time: November 28, 2017, 20:12 UTC
-
Edited time: August 12, 2024, 20:01 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonGuardDutyServiceRolePolicy
Policy version
Policy version: v10 (default)
The policy's default version is the version that defines the permissions for the policy. When a user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request.
JSON policy document
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "GuardDutyGetDescribeListPolicy", "Effect" : "Allow", "Action" : [ "ec2:DescribeInstances", "ec2:DescribeImages", "ec2:DescribeVpcEndpoints", "ec2:DescribeSubnets", "ec2:DescribeVpcPeeringConnections", "ec2:DescribeTransitGatewayAttachments", "organizations:ListAccounts", "organizations:DescribeAccount", "organizations:DescribeOrganization", "s3:GetBucketPublicAccessBlock", "s3:GetEncryptionConfiguration", "s3:GetBucketTagging", "s3:GetAccountPublicAccessBlock", "s3:ListAllMyBuckets", "s3:GetBucketAcl", "s3:GetBucketPolicy", "s3:GetBucketPolicyStatus", "lambda:GetFunctionConfiguration", "lambda:ListTags", "eks:ListClusters", "eks:DescribeCluster", "ec2:DescribeVpcEndpointServices", "ec2:DescribeVpcs", "ec2:DescribeSecurityGroups", "ecs:ListClusters", "ecs:DescribeClusters" ], "Resource" : "*" }, { "Sid" : "GuardDutyCreateSLRPolicy", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "malware-protection.guardduty.amazonaws.com" } } }, { "Sid" : "GuardDutyCreateVpcEndpointPolicy", "Effect" : "Allow", "Action" : "ec2:CreateVpcEndpoint", "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" }, "StringLike" : { "ec2:VpceServiceName" : [ "com.amazonaws.*.guardduty-data", "com.amazonaws.*.guardduty-data-fips" ] } } }, { "Sid" : "GuardDutyModifyDeleteVpcEndpointPolicy", "Effect" : "Allow", "Action" : [ "ec2:ModifyVpcEndpoint", "ec2:DeleteVpcEndpoints" ], "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "Null" : { "aws:ResourceTag/GuardDutyManaged" : false } } }, { "Sid" : "GuardDutyCreateModifyVpcEndpointNetworkPolicy", "Effect" : "Allow", "Action" : [ "ec2:CreateVpcEndpoint", "ec2:ModifyVpcEndpoint" ], "Resource" : [ "arn:aws:ec2:*:*:vpc/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:subnet/*" ] }, { "Sid" : "GuardDutyCreateTagsDuringVpcEndpointCreationPolicy", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateVpcEndpoint" }, "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutySecurityGroupManagementPolicy", "Effect" : "Allow", "Action" : [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress", "ec2:DeleteSecurityGroup" ], "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "Null" : { "aws:ResourceTag/GuardDutyManaged" : false } } }, { "Sid" : "GuardDutyCreateSecurityGroupPolicy", "Effect" : "Allow", "Action" : "ec2:CreateSecurityGroup", "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "StringLike" : { "aws:RequestTag/GuardDutyManaged" : "*" } } }, { "Sid" : "GuardDutyCreateSecurityGroupForVpcPolicy", "Effect" : "Allow", "Action" : "ec2:CreateSecurityGroup", "Resource" : "arn:aws:ec2:*:*:vpc/*" }, { "Sid" : "GuardDutyCreateTagsDuringSecurityGroupCreationPolicy", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateSecurityGroup" }, "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyCreateEksAddonPolicy", "Effect" : "Allow", "Action" : "eks:CreateAddon", "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyEksAddonManagementPolicy", "Effect" : "Allow", "Action" : [ "eks:DeleteAddon", "eks:UpdateAddon", "eks:DescribeAddon" ], "Resource" : "arn:aws:eks:*:*:addon/*/aws-guardduty-agent/*" }, { "Sid" : "GuardDutyEksClusterTagResourcePolicy", "Effect" : "Allow", "Action" : "eks:TagResource", "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyEcsPutAccountSettingsDefaultPolicy", "Effect" : "Allow", "Action" : "ecs:PutAccountSettingDefault", "Resource" : "*", "Condition" : { "StringEquals" : { "ecs:account-setting" : [ "guardDutyActivate" ] } } }, { "Sid" : "SsmCreateDescribeUpdateDeleteStartAssociationPermission", "Effect" : "Allow", "Action" : [ "ssm:DescribeAssociation", "ssm:DeleteAssociation", "ssm:UpdateAssociation", "ssm:CreateAssociation", "ssm:StartAssociationsOnce" ], "Resource" : "arn:aws:ssm:*:*:association/*", "Condition" : { "StringEquals" : { "aws:ResourceTag/GuardDutyManaged" : "true" } } }, { "Sid" : "SsmAddTagsToResourcePermission", "Effect" : "Allow", "Action" : [ "ssm:AddTagsToResource" ], "Resource" : "arn:aws:ssm:*:*:association/*", "Condition" : { "ForAllValues:StringEquals" : { "aws:TagKeys" : [ "GuardDutyManaged" ] }, "StringEquals" : { "aws:ResourceTag/GuardDutyManaged" : "true" } } }, { "Sid" : "SsmCreateUpdateAssociationInstanceDocumentPermission", "Effect" : "Allow", "Action" : [ "ssm:CreateAssociation", "ssm:UpdateAssociation" ], "Resource" : "arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin" }, { "Sid" : "SsmSendCommandPermission", "Effect" : "Allow", "Action" : "ssm:SendCommand", "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin" ] }, { "Sid" : "SsmGetCommandStatus", "Effect" : "Allow", "Action" : "ssm:GetCommandInvocation", "Resource" : "*" } ] }