Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
AmazonECS_FullAccess
Deskripsi: Menyediakan akses administratif ke ECS sumber daya Amazon dan mengaktifkan ECS fitur melalui akses ke sumber daya AWS layanan lain, termasukVPCs, grup Auto Scaling, dan CloudFormation tumpukan.
AmazonECS_FullAccess
adalah kebijakan yang AWS dikelola.
Menggunakan kebijakan ini
Anda dapat melampirkan AmazonECS_FullAccess
ke pengguna, grup, dan peran Anda.
Rincian kebijakan
-
Jenis: kebijakan AWS terkelola
-
Waktu pembuatan: 07 November 2017, 21:36 UTC
-
Waktu telah diedit: 13 Agustus 2024, 19:39 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonECS_FullAccess
Versi kebijakan
Versi kebijakan: v21 (default)
Versi default kebijakan adalah versi yang menentukan izin untuk kebijakan tersebut. Saat pengguna atau peran dengan kebijakan membuat permintaan untuk mengakses AWS sumber daya, AWS periksa versi default kebijakan untuk menentukan apakah akan mengizinkan permintaan tersebut.
JSONdokumen kebijakan
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "ECSIntegrationsManagementPolicy", "Effect" : "Allow", "Action" : [ "application-autoscaling:DeleteScalingPolicy", "application-autoscaling:DeregisterScalableTarget", "application-autoscaling:DescribeScalableTargets", "application-autoscaling:DescribeScalingActivities", "application-autoscaling:DescribeScalingPolicies", "application-autoscaling:PutScalingPolicy", "application-autoscaling:RegisterScalableTarget", "appmesh:DescribeVirtualGateway", "appmesh:DescribeVirtualNode", "appmesh:ListMeshes", "appmesh:ListVirtualGateways", "appmesh:ListVirtualNodes", "autoscaling:CreateAutoScalingGroup", "autoscaling:CreateLaunchConfiguration", "autoscaling:DeleteAutoScalingGroup", "autoscaling:DeleteLaunchConfiguration", "autoscaling:Describe*", "autoscaling:UpdateAutoScalingGroup", "cloudformation:CreateStack", "cloudformation:DeleteStack", "cloudformation:DescribeStack*", "cloudformation:UpdateStack", "cloudwatch:DeleteAlarms", "cloudwatch:DescribeAlarms", "cloudwatch:GetMetricStatistics", "cloudwatch:PutMetricAlarm", "codedeploy:BatchGetApplicationRevisions", "codedeploy:BatchGetApplications", "codedeploy:BatchGetDeploymentGroups", "codedeploy:BatchGetDeployments", "codedeploy:ContinueDeployment", "codedeploy:CreateApplication", "codedeploy:CreateDeployment", "codedeploy:CreateDeploymentGroup", "codedeploy:GetApplication", "codedeploy:GetApplicationRevision", "codedeploy:GetDeployment", "codedeploy:GetDeploymentConfig", "codedeploy:GetDeploymentGroup", "codedeploy:GetDeploymentTarget", "codedeploy:ListApplicationRevisions", "codedeploy:ListApplications", "codedeploy:ListDeploymentConfigs", "codedeploy:ListDeploymentGroups", "codedeploy:ListDeployments", "codedeploy:ListDeploymentTargets", "codedeploy:RegisterApplicationRevision", "codedeploy:StopDeployment", "ec2:AssociateRouteTable", "ec2:AttachInternetGateway", "ec2:AuthorizeSecurityGroupIngress", "ec2:CancelSpotFleetRequests", "ec2:CreateInternetGateway", "ec2:CreateLaunchTemplate", "ec2:CreateRoute", "ec2:CreateRouteTable", "ec2:CreateSecurityGroup", "ec2:CreateSubnet", "ec2:CreateVpc", "ec2:DeleteLaunchTemplate", "ec2:DeleteSubnet", "ec2:DeleteVpc", "ec2:Describe*", "ec2:DetachInternetGateway", "ec2:DisassociateRouteTable", "ec2:ModifySubnetAttribute", "ec2:ModifyVpcAttribute", "ec2:RequestSpotFleet", "ec2:RunInstances", "ecs:*", "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticloadbalancing:CreateListener", "elasticloadbalancing:CreateLoadBalancer", "elasticloadbalancing:CreateRule", "elasticloadbalancing:CreateTargetGroup", "elasticloadbalancing:DeleteListener", "elasticloadbalancing:DeleteLoadBalancer", "elasticloadbalancing:DeleteRule", "elasticloadbalancing:DeleteTargetGroup", "elasticloadbalancing:DescribeListeners", "elasticloadbalancing:DescribeLoadBalancers", "elasticloadbalancing:DescribeRules", "elasticloadbalancing:DescribeTargetGroups", "events:DeleteRule", "events:DescribeRule", "events:ListRuleNamesByTarget", "events:ListTargetsByRule", "events:PutRule", "events:PutTargets", "events:RemoveTargets", "fsx:DescribeFileSystems", "iam:ListAttachedRolePolicies", "iam:ListInstanceProfiles", "iam:ListRoles", "lambda:ListFunctions", "logs:CreateLogGroup", "logs:DescribeLogGroups", "logs:FilterLogEvents", "route53:CreateHostedZone", "route53:DeleteHostedZone", "route53:GetHealthCheck", "route53:GetHostedZone", "route53:ListHostedZonesByName", "servicediscovery:CreatePrivateDnsNamespace", "servicediscovery:CreateService", "servicediscovery:DeleteService", "servicediscovery:GetNamespace", "servicediscovery:GetOperation", "servicediscovery:GetService", "servicediscovery:ListNamespaces", "servicediscovery:ListServices", "servicediscovery:UpdateService", "sns:ListTopics" ], "Resource" : [ "*" ] }, { "Sid" : "SSMPolicy", "Effect" : "Allow", "Action" : [ "ssm:GetParameter", "ssm:GetParameters", "ssm:GetParametersByPath" ], "Resource" : "arn:aws:ssm:*:*:parameter/aws/service/ecs*" }, { "Sid" : "ManagedCloudformationResourcesCleanupPolicy", "Effect" : "Allow", "Action" : [ "ec2:DeleteInternetGateway", "ec2:DeleteRoute", "ec2:DeleteRouteTable", "ec2:DeleteSecurityGroup" ], "Resource" : [ "*" ], "Condition" : { "StringLike" : { "ec2:ResourceTag/aws:cloudformation:stack-name" : "EC2ContainerService-*" } } }, { "Sid" : "TasksPassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : "ecs-tasks.amazonaws.com" } } }, { "Sid" : "InfrastructurePassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsInfrastructureRole" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : "ecs.amazonaws.com" } } }, { "Sid" : "InstancePassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsInstanceRole*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : [ "ec2.amazonaws.com", "ec2.amazonaws.com.cn" ] } } }, { "Sid" : "AutoScalingPassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsAutoscaleRole*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : [ "application-autoscaling.amazonaws.com", "application-autoscaling.amazonaws.com.cn" ] } } }, { "Sid" : "ServiceLinkedRoleCreationPolicy", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringLike" : { "iam:AWSServiceName" : [ "ecs.amazonaws.com", "autoscaling.amazonaws.com", "ecs.application-autoscaling.amazonaws.com", "spot.amazonaws.com", "spotfleet.amazonaws.com" ] } } }, { "Sid" : "ELBTaggingPolicy", "Effect" : "Allow", "Action" : [ "elasticloadbalancing:AddTags" ], "Resource" : "*", "Condition" : { "StringEquals" : { "elasticloadbalancing:CreateAction" : [ "CreateTargetGroup", "CreateRule", "CreateListener", "CreateLoadBalancer" ] } } } ] }