AmazonSageMakerHyperPodInferenceAccess - AWS 관리형 정책

기계 번역으로 제공되는 번역입니다. 제공된 번역과 원본 영어의 내용이 상충하는 경우에는 영어 버전이 우선합니다.

AmazonSageMakerHyperPodInferenceAccess

설명:이 정책은 SageMaker HyperPod 추론 연산자를 설정하는 데 필요한 관리 권한을 제공합니다. 이를 통해 추론 운영자는 HyperPod 클러스터에서 추론 워크로드를 배포하고 관리하는 데 필요한 AWS 네트워킹 리소스, Amazon S3, Amazon ECR, Amazon CloudWatch, AWS Certificate Manager 및 SageMaker 리소스에 액세스할 수 있습니다.

AmazonSageMakerHyperPodInferenceAccess은(는) AWS 관리형 정책입니다.

이 정책 사용

사용자, 그룹 및 역할에 AmazonSageMakerHyperPodInferenceAccess를 연결할 수 있습니다.

정책 세부 정보

  • Type: AWS managed 정책

  • 생성 시간: 2026년 1월 27일, 20:34 UTC

  • 편집된 시간: 2026년 2월 12일, 18:01 UTC

  • ARN: arn:aws:iam::aws:policy/AmazonSageMakerHyperPodInferenceAccess

정책 버전

정책 버전: v3(기본값)

정책의 기본 버전은 정책에 대한 권한을 정의하는 버전입니다. 정책이 있는 사용자 또는 역할이 AWS 리소스에 대한 액세스를 요청하면는 정책의 기본 버전을 AWS 확인하여 요청을 허용할지 여부를 결정합니다.

JSON 정책 문서

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "DeleteObjectsPermission", "Effect" : "Allow", "Action" : [ "s3:DeleteObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "S3GetObjectAccess", "Effect" : "Allow", "Action" : [ "s3:GetObject" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:ExistingObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "S3PutObjectAccess", "Effect" : "Allow", "Action" : [ "s3:PutObject", "s3:PutObjectTagging" ], "Resource" : [ "arn:aws:s3:::hyperpod-tls*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "s3:RequestObjectTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "ECRAuthorization", "Effect" : "Allow", "Action" : [ "ecr:GetAuthorizationToken" ], "Resource" : "*" }, { "Sid" : "ECRRepositoryAccess", "Effect" : "Allow", "Action" : [ "ecr:GetDownloadUrlForLayer", "ecr:BatchGetImage" ], "Resource" : "arn:aws:ecr:*:*:repository/*" }, { "Sid" : "EC2DescribeAccess", "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcs", "ec2:DescribeInstanceTypes", "ec2:DescribeNetworkInterfaces", "ec2:DescribeSubnets", "ec2:DescribeDhcpOptions", "ec2:DescribeSecurityGroups" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EC2NetworkInterfaceActions", "Effect" : "Allow", "Action" : [ "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission" ], "Resource" : [ "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSClusterAccess", "Effect" : "Allow", "Action" : [ "eks:DescribeCluster", "eks-auth:AssumeRoleForPodIdentity" ], "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "EKSAccessEntryPolicyAssociation", "Effect" : "Allow", "Action" : [ "eks:AssociateAccessPolicy", "eks:DisassociateAccessPolicy" ], "Resource" : "arn:aws:eks:*:*:access-entry/*", "Condition" : { "StringEquals" : { "eks:policyarn" : "arn:aws:eks::aws:cluster-access-policy/AmazonSagemakerHyperpodInferenceMonitoringPolicy" } } }, { "Sid" : "ELBListAndDescribeAccess", "Effect" : "Allow", "Action" : [ "elasticloadbalancing:DescribeLoadBalancers" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "FSxAccess", "Effect" : "Allow", "Action" : [ "fsx:DescribeFileSystems" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateImportPermission", "Effect" : "Allow", "Action" : [ "acm:AddTagsToCertificate", "acm:ImportCertificate" ], "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "ForAllValues:StringEquals" : { "aws:TagKeys" : "CreatedBy" }, "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference", "aws:ResourceTag/CreatedBy" : "HyperPodInference", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "CertificateDeletePermission", "Effect" : "Allow", "Action" : "acm:DeleteCertificate", "Resource" : "arn:aws:acm:*:*:certificate/*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}", "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "AllowPassRoleToSageMaker", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : "arn:aws:iam::*:role/SageMakerHyperPodInference*", "Condition" : { "StringEquals" : { "iam:PassedToService" : "sagemaker.amazonaws.com" } } }, { "Sid" : "CloudWatchMetricsAccess", "Effect" : "Allow", "Action" : [ "cloudwatch:PutMetricData" ], "Resource" : "*", "Condition" : { "StringEquals" : { "cloudwatch:namespace" : "HyperPodInference" } } }, { "Sid" : "CloudWatchLogsAccess", "Effect" : "Allow", "Action" : [ "logs:PutLogEvents", "logs:CreateLogStream", "logs:CreateLogGroup" ], "Resource" : [ "arn:aws:logs:*:*:log-group:*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DescribeModel", "sagemaker:DescribeEndpointConfig", "sagemaker:DescribeEndpoint", "sagemaker:DescribeCluster", "sagemaker:DescribeClusterInference", "sagemaker:UpdateClusterInference", "sagemaker:DescribeHubContent" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpointconfig/*", "arn:aws:sagemaker:*:*:cluster/*", "arn:aws:sagemaker:*:*:hub-content/*", "arn:aws:sagemaker:*:*:hub/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "SageMakerCreateAccess", "Effect" : "Allow", "Action" : [ "sagemaker:CreateModel", "sagemaker:CreateEndpointConfig", "sagemaker:CreateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/CreatedBy" : "HyperPodInference" } } }, { "Sid" : "SageMakerTagging", "Effect" : "Allow", "Action" : [ "sagemaker:AddTags" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "sagemaker:TaggingAction" : [ "CreateModel", "CreateEndpointConfig", "CreateEndpoint" ] } } }, { "Sid" : "SageMakerDeleteAccess", "Effect" : "Allow", "Action" : [ "sagemaker:DeleteModel", "sagemaker:DeleteEndpointConfig", "sagemaker:DeleteEndpoint", "sagemaker:UpdateEndpoint" ], "Resource" : [ "arn:aws:sagemaker:*:*:model/*", "arn:aws:sagemaker:*:*:endpoint/*", "arn:aws:sagemaker:*:*:endpoint-config/*" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "HyperPodInference" } } } ] }

자세히 알아보기