Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
AmazonDataZoneRedshiftGlueProvisioningPolicy
Deskripsi: Amazon DataZone adalah layanan manajemen data yang memungkinkan Anda membuat katalog, menemukan, mengatur, berbagi, dan menganalisis data Anda. Dengan Amazon DataZone, Anda dapat berbagi dan mengakses data Anda di seluruh akun dan wilayah yang didukung. Amazon DataZone menyederhanakan pengalaman Anda di seluruh AWS layanan, termasuk, namun tidak terbatas pada, Amazon Redshift, Amazon Athena, AWS Glue, dan Lake Formation. AWS
AmazonDataZoneRedshiftGlueProvisioningPolicy
adalah kebijakan yang AWS dikelola.
Menggunakan kebijakan ini
Anda dapat melampirkan AmazonDataZoneRedshiftGlueProvisioningPolicy
ke pengguna, grup, dan peran Anda.
Rincian kebijakan
-
Jenis: kebijakan AWS terkelola
-
Waktu pembuatan: 22 September 2023, 20:19 UTC
-
Waktu telah diedit: 12 Maret 2024, 16:44 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonDataZoneRedshiftGlueProvisioningPolicy
Versi kebijakan
Versi kebijakan: v3 (default)
Versi default kebijakan adalah versi yang menentukan izin untuk kebijakan tersebut. Saat pengguna atau peran dengan kebijakan membuat permintaan untuk mengakses AWS sumber daya, AWS periksa versi default kebijakan untuk menentukan apakah akan mengizinkan permintaan tersebut.
Dokumen kebijakan JSON
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "AmazonDataZonePermissionsToCreateEnvironmentRole", "Effect" : "Allow", "Action" : [ "iam:CreateRole", "iam:DetachRolePolicy", "iam:DeleteRolePolicy", "iam:AttachRolePolicy", "iam:PutRolePolicy" ], "Resource" : "arn:aws:iam::*:role/datazone*", "Condition" : { "StringEquals" : { "iam:PermissionsBoundary" : "arn:aws:iam::aws:policy/AmazonDataZoneEnvironmentRolePermissionsBoundary", "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "IamPassRolePermissions", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/datazone*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "glue.amazonaws.com", "lakeformation.amazonaws.com" ], "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZonePermissionsToManageCreatedEnvironmentRole", "Effect" : "Allow", "Action" : [ "iam:DeleteRole", "iam:GetRole" ], "Resource" : "arn:aws:iam::*:role/datazone*", "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneCFStackCreationForEnvironments", "Effect" : "Allow", "Action" : [ "cloudformation:CreateStack", "cloudformation:TagResource" ], "Resource" : [ "arn:aws:cloudformation:*:*:stack/DataZone*" ], "Condition" : { "ForAnyValue:StringLike" : { "aws:TagKeys" : "AmazonDataZoneEnvironment" }, "Null" : { "aws:ResourceTag/AmazonDataZoneEnvironment" : "false" } } }, { "Sid" : "AmazonDataZoneCFStackManagementForEnvironments", "Effect" : "Allow", "Action" : [ "cloudformation:DeleteStack", "cloudformation:DescribeStacks", "cloudformation:DescribeStackEvents" ], "Resource" : [ "arn:aws:cloudformation:*:*:stack/DataZone*" ] }, { "Sid" : "AmazonDataZoneEnvironmentParameterValidation", "Effect" : "Allow", "Action" : [ "lakeformation:GetDataLakeSettings", "lakeformation:PutDataLakeSettings", "lakeformation:RevokePermissions", "lakeformation:ListPermissions", "glue:CreateDatabase", "glue:GetDatabase", "athena:GetWorkGroup", "logs:DescribeLogGroups", "redshift-serverless:GetNamespace", "redshift-serverless:GetWorkgroup", "redshift:DescribeClusters", "secretsmanager:ListSecrets" ], "Resource" : "*" }, { "Sid" : "AmazonDataZoneEnvironmentLakeFormationPermissions", "Effect" : "Allow", "Action" : [ "lakeformation:RegisterResource", "lakeformation:DeregisterResource", "lakeformation:GrantPermissions", "lakeformation:ListResources" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentGlueDeletePermissions", "Effect" : "Allow", "Action" : [ "glue:DeleteDatabase" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentAthenaDeletePermissions", "Effect" : "Allow", "Action" : [ "athena:DeleteWorkGroup" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentAthenaResourceCreation", "Effect" : "Allow", "Action" : [ "athena:CreateWorkGroup", "athena:TagResource", "iam:TagRole", "iam:TagPolicy", "logs:TagLogGroup" ], "Resource" : "*", "Condition" : { "ForAnyValue:StringLike" : { "aws:TagKeys" : "AmazonDataZoneEnvironment" }, "Null" : { "aws:ResourceTag/AmazonDataZoneEnvironment" : "false" }, "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentLogGroupCreation", "Effect" : "Allow", "Action" : [ "logs:CreateLogGroup", "logs:DeleteLogGroup" ], "Resource" : "arn:aws:logs:*:*:log-group:datazone-*", "Condition" : { "ForAnyValue:StringLike" : { "aws:TagKeys" : "AmazonDataZoneEnvironment" }, "Null" : { "aws:ResourceTag/AmazonDataZoneEnvironment" : "false" }, "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentLogGroupManagement", "Action" : [ "logs:PutRetentionPolicy" ], "Resource" : "arn:aws:logs:*:*:log-group:datazone-*", "Effect" : "Allow", "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentIAMPolicyManagement", "Effect" : "Allow", "Action" : [ "iam:DeletePolicy", "iam:CreatePolicy", "iam:GetPolicy", "iam:ListPolicyVersions" ], "Resource" : [ "arn:aws:iam::*:policy/datazone*" ], "Condition" : { "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "AmazonDataZoneEnvironmentS3ValidationPermissions", "Effect" : "Allow", "Action" : [ "s3:ListAllMyBuckets", "s3:ListBucket" ], "Resource" : "arn:aws:s3:::*" }, { "Sid" : "AmazonDataZoneEnvironmentKMSDecryptPermissions", "Effect" : "Allow", "Action" : [ "kms:GenerateDataKey", "kms:Decrypt" ], "Resource" : "*", "Condition" : { "Null" : { "aws:ResourceTag/AmazonDataZoneEnvironment" : "false" } } }, { "Sid" : "PermissionsToTagAmazonDataZoneEnvironmentGlueResources", "Effect" : "Allow", "Action" : [ "glue:TagResource" ], "Resource" : "*", "Condition" : { "ForAnyValue:StringLike" : { "aws:TagKeys" : "AmazonDataZoneEnvironment" }, "Null" : { "aws:RequestTag/AmazonDataZoneEnvironment" : "false" } } }, { "Sid" : "PermissionsToGetAmazonDataZoneEnvironmentBlueprintTemplates", "Effect" : "Allow", "Action" : "s3:GetObject", "Resource" : "*", "Condition" : { "StringNotEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" }, "StringEquals" : { "aws:CalledViaFirst" : [ "cloudformation.amazonaws.com" ] } } }, { "Sid" : "RedshiftDataPermissions", "Effect" : "Allow", "Action" : [ "redshift-data:ListSchemas", "redshift-data:ExecuteStatement" ], "Resource" : [ "arn:aws:redshift-serverless:*:*:workgroup/*", "arn:aws:redshift:*:*:cluster:*" ] }, { "Sid" : "DescribeStatementPermissions", "Effect" : "Allow", "Action" : [ "redshift-data:DescribeStatement" ], "Resource" : "*" }, { "Sid" : "GetSecretValuePermissions", "Effect" : "Allow", "Action" : [ "secretsmanager:GetSecretValue" ], "Resource" : "*", "Condition" : { "StringLike" : { "secretsmanager:ResourceTag/AmazonDataZoneDomain" : "dzd*" } } } ] }