本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSLambdaFullAccess
描述:此策略已进入弃用路径。有关指南,请参阅文档:https://docs.aws.amazon.com/lambda/latest/dg/access-control-identity-based.html。提供对 Lambda、S3、DynamoDB、CloudWatch Metrics 和 Logs 的完全访问权限。
AWSLambdaFullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSLambdaFullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型:AWS 托管策略
-
创建时间:2015 年 2 月 6 日 18:40 UTC
-
编辑时间:2017 年 11 月 27 日 23:22 UTC
-
ARN:
arn:aws:iam::aws:policy/AWSLambdaFullAccess
策略版本
策略版本:v8(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时,AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"cloudformation:DescribeChangeSet",
"cloudformation:DescribeStackResources",
"cloudformation:DescribeStacks",
"cloudformation:GetTemplate",
"cloudformation:ListStackResources",
"cloudwatch:*",
"cognito-identity:ListIdentityPools",
"cognito-sync:GetCognitoEvents",
"cognito-sync:SetCognitoEvents",
"dynamodb:*",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"events:*",
"iam:GetPolicy",
"iam:GetPolicyVersion",
"iam:GetRole",
"iam:GetRolePolicy",
"iam:ListAttachedRolePolicies",
"iam:ListRolePolicies",
"iam:ListRoles",
"iam:PassRole",
"iot:AttachPrincipalPolicy",
"iot:AttachThingPrincipal",
"iot:CreateKeysAndCertificate",
"iot:CreatePolicy",
"iot:CreateThing",
"iot:CreateTopicRule",
"iot:DescribeEndpoint",
"iot:GetTopicRule",
"iot:ListPolicies",
"iot:ListThings",
"iot:ListTopicRules",
"iot:ReplaceTopicRule",
"kinesis:DescribeStream",
"kinesis:ListStreams",
"kinesis:PutRecord",
"kms:ListAliases",
"lambda:*",
"logs:*",
"s3:*",
"sns:ListSubscriptions",
"sns:ListSubscriptionsByTopic",
"sns:ListTopics",
"sns:Publish",
"sns:Subscribe",
"sns:Unsubscribe",
"sqs:ListQueues",
"sqs:SendMessage",
"tag:GetResources",
"xray:PutTelemetryRecords",
"xray:PutTraceSegments"
],
"Resource" : "*"
}
]
}