Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
AWS-SSM-RemediationAutomation-ExecutionRolePolicy
Deskripsi: Memberikan izin untuk Memperbaiki masalah dengan SSM layanan dengan menjalankan aktivitas yang ditentukan dalam Dokumen Otomasi, terutama digunakan untuk menjalankan dokumen Otomasi dalam pengaturan akun/wilayah target dengan memulihkan SSM kesehatan layanan di semua node.
AWS-SSM-RemediationAutomation-ExecutionRolePolicy
adalah kebijakan yang AWS dikelola.
Menggunakan kebijakan ini
Anda dapat melampirkan AWS-SSM-RemediationAutomation-ExecutionRolePolicy
ke pengguna, grup, dan peran Anda.
Rincian kebijakan
-
Jenis: kebijakan AWS terkelola
-
Waktu pembuatan: 16 November 2024, 00:17 UTC
-
Waktu yang telah diedit: 16 November 2024, 00:17 UTC
-
ARN:
arn:aws:iam::aws:policy/AWS-SSM-RemediationAutomation-ExecutionRolePolicy
Versi kebijakan
Versi kebijakan: v1 (default)
Versi default kebijakan adalah versi yang menentukan izin untuk kebijakan tersebut. Saat pengguna atau peran dengan kebijakan membuat permintaan untuk mengakses AWS sumber daya, AWS periksa versi default kebijakan untuk menentukan apakah akan mengizinkan permintaan tersebut.
JSONdokumen kebijakan
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "AllowReadOnlyAccessSSMResource",
"Effect" : "Allow",
"Action" : [
"ssm:GetAutomationExecution",
"ssm:DescribeAutomationExecutions",
"ssm:DescribeAutomationStepExecutions"
],
"Resource" : "*"
},
{
"Sid" : "AllowReadOnlyAccessEC2Resource",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeVpcAttribute",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeSecurityGroups"
],
"Resource" : "*"
},
{
"Sid" : "AllowCreateVpcEndpointForTaggedSecurityGroup",
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/SystemsManager::FindingNetworkingSecurityGroups::VPCE::SG" : "VPCEndpointSecurityGroup"
}
}
},
{
"Sid" : "AllowCreateVpcEndpoint",
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*",
"arn:aws:ec2:*:*:subnet/*"
]
},
{
"Sid" : "RestrictCreateVpcEndpointForSSMService",
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc-endpoint/*"
],
"Condition" : {
"StringLike" : {
"ec2:VpceServiceName" : [
"com.amazonaws.*.ssm",
"com.amazonaws.*.ssmmessages",
"com.amazonaws.*.ec2messages"
]
},
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingVPCEndpoints::VPCE" : "VPCEndpoint"
}
}
},
{
"Sid" : "RestrictCreateVpcEndpointWithTag",
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : [
"arn:aws:ec2:*:*:vpc-endpoint/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingVPCEndpoints::VPCE" : "VPCEndpoint",
"ec2:CreateAction" : [
"CreateVpcEndpoint"
]
}
}
},
{
"Sid" : "AllowModifyVpcAttributeForDns",
"Effect" : "Allow",
"Action" : [
"ec2:ModifyVpcAttribute"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*"
],
"Condition" : {
"StringEquals" : {
"ec2:Attribute" : [
"EnableDnsSupport",
"EnableDnsHostnames"
]
}
}
},
{
"Sid" : "AllowSecurityGroupRuleUpdate",
"Effect" : "Allow",
"Action" : [
"ec2:AuthorizeSecurityGroupEgress"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
]
},
{
"Sid" : "AllowSecurityGroupRuleUpdateForTaggedResource",
"Effect" : "Allow",
"Action" : [
"ec2:RevokeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/SystemsManager::FindingNetworkingSecurityGroups::VPCE::SG" : "VPCEndpointSecurityGroup"
}
}
},
{
"Sid" : "AllowSecurityGroupRuleUpdateWithTag",
"Effect" : "Allow",
"Action" : [
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group-rule/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingSecurityGroups::SG::Rule" : "HTTPSAccess"
}
}
},
{
"Sid" : "AllowSecurityGroupRuleUpdateTagRule",
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : [
"arn:aws:ec2:*:*:security-group-rule/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingSecurityGroups::SG::Rule" : "HTTPSAccess",
"ec2:CreateAction" : [
"AuthorizeSecurityGroupEgress",
"AuthorizeSecurityGroupIngress"
]
}
}
},
{
"Sid" : "AllowCreateSecurityGroupForVPCEndpoint",
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*"
]
},
{
"Sid" : "AllowCreateSecurityGroupWithTag",
"Effect" : "Allow",
"Action" : [
"ec2:CreateSecurityGroup"
],
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingSecurityGroups::VPCE::SG" : "VPCEndpointSecurityGroup"
}
}
},
{
"Sid" : "AllowTagCreationForSecurityGroupTags",
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : [
"arn:aws:ec2:*:*:security-group/*"
],
"Condition" : {
"StringEquals" : {
"aws:RequestTag/SystemsManager::FindingNetworkingSecurityGroups::VPCE::SG" : "VPCEndpointSecurityGroup",
"ec2:CreateAction" : [
"CreateSecurityGroup"
]
}
}
},
{
"Sid" : "AllowExecuteSSMAutomation",
"Effect" : "Allow",
"Action" : [
"ssm:StartAutomationExecution"
],
"Resource" : [
"arn:aws:ssm:*:*:automation-definition/AWS-OrchestrateUnmanagedEC2Actions:*",
"arn:aws:ssm:*:*:automation-definition/AWS-RemediateSSMAgent*:*"
]
},
{
"Sid" : "AllowKMSOperations",
"Effect" : "Allow",
"Action" : [
"kms:Decrypt",
"kms:GenerateDataKey"
],
"Resource" : "arn:aws:kms:*:*:key/*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/SystemsManagerManaged" : "true"
},
"ArnLike" : {
"kms:EncryptionContext:aws:s3:arn" : "arn:aws:s3:::do-not-delete-ssm-diagnosis-*"
},
"StringLike" : {
"kms:ViaService" : "s3.*.amazonaws.com"
},
"Bool" : {
"aws:ViaAWSService" : "true"
}
}
},
{
"Sid" : "AllowPassRoleOnSelfToSsm",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/AWS-SSM-RemediationExecutionRole*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "ssm.amazonaws.com"
}
}
}
]
}