Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.
AmazonRDSServiceRolePolicy
Descripción: permite a Amazon RDS administrar recursos de AWS en su nombre.
AmazonRDSServiceRolePolicy
es una política administrada de AWS.
Uso de la política
Esta política está asociada a un rol vinculado a un servicio. Esto permite a dicho servicio realizar acciones por usted. No puede asociar esta política a los usuarios, grupos o roles.
Información de la política
-
Tipo: política de rol vinculado a un servicio
-
Hora de creación: 8 de enero de 2018 a las 18:17 UTC
-
Hora de edición: 01 de julio de 2024 a las 22:42 h UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonRDSServiceRolePolicy
Versión de la política
Versión de la política: v14 (predeterminada)
La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita acceso a un recurso de AWS, AWS comprueba la versión predeterminada de la política para decidir si permite o no la solicitud.
Documento de política JSON
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "CrossRegionCommunication",
"Effect" : "Allow",
"Action" : [
"rds:CrossRegionCommunication"
],
"Resource" : "*"
},
{
"Sid" : "Ec2",
"Effect" : "Allow",
"Action" : [
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateCoipPoolPermission",
"ec2:CreateLocalGatewayRouteTablePermission",
"ec2:CreateNetworkInterface",
"ec2:CreateSecurityGroup",
"ec2:DeleteCoipPoolPermission",
"ec2:DeleteLocalGatewayRouteTablePermission",
"ec2:DeleteNetworkInterface",
"ec2:DeleteSecurityGroup",
"ec2:DescribeAddresses",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeCoipPools",
"ec2:DescribeInternetGateways",
"ec2:DescribeLocalGatewayRouteTablePermissions",
"ec2:DescribeLocalGatewayRouteTables",
"ec2:DescribeLocalGatewayRouteTableVpcAssociations",
"ec2:DescribeLocalGateways",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcAttribute",
"ec2:DescribeVpcs",
"ec2:DisassociateAddress",
"ec2:ModifyNetworkInterfaceAttribute",
"ec2:ModifyVpcEndpoint",
"ec2:ReleaseAddress",
"ec2:RevokeSecurityGroupIngress",
"ec2:CreateVpcEndpoint",
"ec2:DescribeVpcEndpoints",
"ec2:DeleteVpcEndpoints",
"ec2:AssignPrivateIpAddresses",
"ec2:UnassignPrivateIpAddresses"
],
"Resource" : "*"
},
{
"Sid" : "CloudWatchLogs",
"Effect" : "Allow",
"Action" : [
"logs:CreateLogGroup"
],
"Resource" : [
"arn:aws:logs:*:*:log-group:/aws/rds/*",
"arn:aws:logs:*:*:log-group:/aws/docdb/*",
"arn:aws:logs:*:*:log-group:/aws/neptune/*"
]
},
{
"Sid" : "CloudWatchStreams",
"Effect" : "Allow",
"Action" : [
"logs:CreateLogStream",
"logs:PutLogEvents",
"logs:DescribeLogStreams"
],
"Resource" : [
"arn:aws:logs:*:*:log-group:/aws/rds/*:log-stream:*",
"arn:aws:logs:*:*:log-group:/aws/docdb/*:log-stream:*",
"arn:aws:logs:*:*:log-group:/aws/neptune/*:log-stream:*"
]
},
{
"Sid" : "Kinesis",
"Effect" : "Allow",
"Action" : [
"kinesis:CreateStream",
"kinesis:PutRecord",
"kinesis:PutRecords",
"kinesis:DescribeStream",
"kinesis:SplitShard",
"kinesis:MergeShards",
"kinesis:DeleteStream",
"kinesis:UpdateShardCount"
],
"Resource" : [
"arn:aws:kinesis:*:*:stream/aws-rds-das-*"
]
},
{
"Sid" : "CloudWatch",
"Effect" : "Allow",
"Action" : [
"cloudwatch:PutMetricData"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"cloudwatch:namespace" : [
"AWS/DocDB",
"AWS/Neptune",
"AWS/RDS",
"AWS/Usage"
]
}
}
},
{
"Sid" : "SecretsManagerPassword",
"Effect" : "Allow",
"Action" : [
"secretsmanager:GetRandomPassword"
],
"Resource" : "*"
},
{
"Sid" : "SecretsManagerSecret",
"Effect" : "Allow",
"Action" : [
"secretsmanager:DeleteSecret",
"secretsmanager:DescribeSecret",
"secretsmanager:PutSecretValue",
"secretsmanager:RotateSecret",
"secretsmanager:UpdateSecret",
"secretsmanager:UpdateSecretVersionStage",
"secretsmanager:ListSecretVersionIds"
],
"Resource" : [
"arn:aws:secretsmanager:*:*:secret:rds!*"
],
"Condition" : {
"StringLike" : {
"secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "rds"
}
}
},
{
"Sid" : "SecretsManagerTags",
"Effect" : "Allow",
"Action" : "secretsmanager:TagResource",
"Resource" : "arn:aws:secretsmanager:*:*:secret:rds!*",
"Condition" : {
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"aws:rds:primaryDBInstanceArn",
"aws:rds:primaryDBClusterArn"
]
},
"StringLike" : {
"secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "rds"
}
}
}
]
}