本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWS-SSM-DiagnosisAutomation-ExecutionRolePolicy
描述:通过执行 Automation Documents 中定义的活动来提供诊断SSM服务问题的权限,这些活动主要用于通过诊断所有节点的SSM服务运行状况在目标账户/区域设置中运行自动化文档。
AWS-SSM-DiagnosisAutomation-ExecutionRolePolicy
是一项 AWS 托管式策略。
使用此策略
您可以将 AWS-SSM-DiagnosisAutomation-ExecutionRolePolicy
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创作时间:2024 年 11 月 16 日 00:08 UTC
-
编辑时间:2024 年 11 月 16 日 00:08 UTC
-
ARN:
arn:aws:iam::aws:policy/AWS-SSM-DiagnosisAutomation-ExecutionRolePolicy
策略版本
策略版本:v1 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "AllowReadOnlyAccessEC2Resource",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeVpcs",
"ec2:DescribeVpcAttribute",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups",
"ec2:DescribeInstances",
"ec2:DescribeInternetGateways"
],
"Resource" : "*"
},
{
"Sid" : "AllowReadOnlyAccessSSMResource",
"Effect" : "Allow",
"Action" : [
"ssm:DescribeAutomationStepExecutions",
"ssm:DescribeInstanceInformation",
"ssm:DescribeAutomationExecutions",
"ssm:GetAutomationExecution"
],
"Resource" : "*"
},
{
"Sid" : "AllowExecuteSSMAutomation",
"Effect" : "Allow",
"Action" : [
"ssm:StartAutomationExecution"
],
"Resource" : [
"arn:aws:ssm:*:*:automation-definition/AWS-*UnmanagedEC2*:*"
]
},
{
"Sid" : "AllowKMSOperations",
"Effect" : "Allow",
"Action" : [
"kms:Decrypt",
"kms:GenerateDataKey"
],
"Resource" : "arn:aws:kms:*:*:key/*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/SystemsManagerManaged" : "true"
},
"ArnLike" : {
"kms:EncryptionContext:aws:s3:arn" : "arn:aws:s3:::do-not-delete-ssm-diagnosis-*"
},
"StringLike" : {
"kms:ViaService" : "s3.*.amazonaws.com"
},
"Bool" : {
"aws:ViaAWSService" : "true"
}
}
},
{
"Sid" : "AllowPassRoleOnSelfToSsm",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/AWS-SSM-DiagnosisExecutionRole*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "ssm.amazonaws.com"
}
}
}
]
}