SecurityLakeServiceLinkedRole
Description: This policy grants permissions to operate the Amazon Security Lake service on your behalf
SecurityLakeServiceLinkedRole
is an AWS managed policy.
Using this policy
This policy is attached to a service-linked role that allows the service to perform actions on your behalf. You cannot attach this policy to your users, groups, or roles.
Policy
details
-
Type: Service-linked role policy
-
Creation time: November 29, 2022, 14:03 UTC
-
Edited time: April 19, 2024, 16:00 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/SecurityLakeServiceLinkedRole
Policy version
Policy version: v3 (default)
The policy's default version is the version that defines the permissions for the policy. When a user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request.
JSON policy document
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "OrganizationsPolicies",
"Effect" : "Allow",
"Action" : [
"organizations:ListAccounts",
"organizations:DescribeOrganization"
],
"Resource" : [
"*"
]
},
{
"Sid" : "DescribeOrgAccounts",
"Effect" : "Allow",
"Action" : [
"organizations:DescribeAccount"
],
"Resource" : [
"arn:aws:organizations::*:account/o-*/*"
]
},
{
"Sid" : "AllowManagementOfServiceLinkedChannel",
"Effect" : "Allow",
"Action" : [
"cloudtrail:CreateServiceLinkedChannel",
"cloudtrail:DeleteServiceLinkedChannel",
"cloudtrail:GetServiceLinkedChannel",
"cloudtrail:UpdateServiceLinkedChannel"
],
"Resource" : "arn:aws:cloudtrail:*:*:channel/aws-service-channel/security-lake/*"
},
{
"Sid" : "AllowListServiceLinkedChannel",
"Effect" : "Allow",
"Action" : [
"cloudtrail:ListServiceLinkedChannels"
],
"Resource" : "*"
},
{
"Sid" : "DescribeAnyVpc",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeVpcs"
],
"Resource" : "*"
},
{
"Sid" : "ListDelegatedAdmins",
"Effect" : "Allow",
"Action" : [
"organizations:ListDelegatedAdministrators"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"organizations:ServicePrincipal" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowWafLoggingConfiguration",
"Effect" : "Allow",
"Action" : [
"wafv2:PutLoggingConfiguration",
"wafv2:GetLoggingConfiguration",
"wafv2:ListLoggingConfigurations",
"wafv2:DeleteLoggingConfiguration"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"wafv2:LogScope" : "SecurityLake"
}
}
},
{
"Sid" : "AllowPutLoggingConfiguration",
"Effect" : "Allow",
"Action" : [
"wafv2:PutLoggingConfiguration"
],
"Resource" : "*",
"Condition" : {
"ArnLike" : {
"wafv2:LogDestinationResource" : "arn:aws:s3:::aws-waf-logs-security-lake-*"
}
}
},
{
"Sid" : "ListWebACLs",
"Effect" : "Allow",
"Action" : [
"wafv2:ListWebACLs"
],
"Resource" : "*"
},
{
"Sid" : "LogDelivery",
"Effect" : "Allow",
"Action" : [
"logs:CreateLogDelivery",
"logs:DeleteLogDelivery"
],
"Resource" : "*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : [
"wafv2.amazonaws.com"
]
}
}
}
]
}