本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
SecurityLakeResourceManagementServiceRolePolicy
描述:提供管理由 Security Lake 创建的资源的权限。
SecurityLakeResourceManagementServiceRolePolicy
是一项 AWS 托管式策略。
使用此策略
此附加到服务相关角色的策略允许服务代表您执行操作。您无法将此策略附加到您的用户、组或角色。
策略详细信息
-
类型:服务相关角色策略
-
创作时间:2024 年 11 月 14 日 22:10 UTC
-
编辑时间:2024 年 11 月 14 日 22:10 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/SecurityLakeResourceManagementServiceRolePolicy
策略版本
策略版本:v1 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "ReadEventBridgeRules",
"Effect" : "Allow",
"Action" : [
"events:ListRules"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ManageSecurityLakeEventRules",
"Effect" : "Allow",
"Action" : [
"events:PutRule"
],
"Resource" : "arn:aws:events:*:*:rule/AmazonSecurityLake-*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ManageSecurityLakeLambdaConfigurations",
"Effect" : "Allow",
"Action" : [
"lambda:GetEventSourceMapping",
"lambda:GetFunction",
"lambda:PutFunctionConcurrency",
"lambda:GetProvisionedConcurrencyConfig",
"lambda:GetFunctionConcurrency",
"lambda:GetRuntimeManagementConfig",
"lambda:PutProvisionedConcurrencyConfig",
"lambda:PublishVersion",
"lambda:DeleteFunctionConcurrency",
"lambda:DeleteEventSourceMapping",
"lambda:GetAlias",
"lambda:GetPolicy",
"lambda:GetFunctionConfiguration",
"lambda:UpdateFunctionConfiguration"
],
"Resource" : [
"arn:aws:lambda:*:*:function:SecurityLake_Glue_Partition_Updater_Lambda*",
"arn:aws:lambda:*:*:function:AmazonSecurityLakeMetastoreManager-*-*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "AllowListLambdaEventSourceMappings",
"Effect" : "Allow",
"Action" : [
"lambda:ListEventSourceMappings"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "AllowUpdateLambdaEventSourceMapping",
"Effect" : "Allow",
"Action" : [
"lambda:UpdateEventSourceMapping"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
},
"StringLike" : {
"lambda:FunctionArn" : "arn:aws:lambda:*:*:function:AmazonSecurityLakeMetastoreManager-*-*"
}
}
},
{
"Sid" : "AllowUpdateLambdaConfigs",
"Effect" : "Allow",
"Action" : [
"lambda:UpdateFunctionConfiguration"
],
"Resource" : "arn:aws:lambda:*:*:function:AmazonSecurityLakeMetastoreManager-*-*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ManageSecurityLakeGlueResources",
"Effect" : "Allow",
"Action" : [
"glue:CreatePartition",
"glue:BatchCreatePartition",
"glue:GetTable",
"glue:GetTables",
"glue:UpdateTable",
"glue:GetDatabase"
],
"Resource" : [
"arn:aws:glue:*:*:table/amazon_security_lake_glue_db*/*",
"arn:aws:glue:*:*:database/amazon_security_lake_glue_db*",
"arn:aws:glue:*:*:catalog"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "AllowDataLakeConfigurationManagement",
"Effect" : "Allow",
"Action" : [
"s3:ListBucket",
"s3:PutObject",
"s3:GetObjectAttributes",
"s3:GetBucketNotification",
"s3:PutBucketNotification",
"s3:GetLifecycleConfiguration",
"s3:PutLifecycleConfiguration",
"s3:GetEncryptionConfiguration",
"s3:GetReplicationConfiguration"
],
"Resource" : [
"arn:aws:s3:::aws-security-data-lake*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "AllowMetaDataCompactionAndManagement",
"Effect" : "Allow",
"Action" : [
"s3:GetObject",
"s3:DeleteObject",
"s3:RestoreObject"
],
"Resource" : [
"arn:aws:s3:::aws-security-data-lake*/metadata/*.avro",
"arn:aws:s3:::aws-security-data-lake*/metadata/*.metadata.json"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ReadSecurityLakeLambdaLogs",
"Effect" : "Allow",
"Action" : [
"logs:DescribeLogStreams",
"logs:StartQuery",
"logs:GetLogEvents",
"logs:GetQueryResults",
"logs:GetLogRecord"
],
"Resource" : [
"arn:aws:logs:*:*:log-group:/aws/lambda/AmazonSecurityLakeMetastoreManager-*-*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ManageSecurityLakeSQSQueue",
"Effect" : "Allow",
"Action" : [
"sqs:StartMessageMoveTask",
"sqs:DeleteMessage",
"sqs:GetQueueUrl",
"sqs:ListDeadLetterSourceQueues",
"sqs:ChangeMessageVisibility",
"sqs:ListMessageMoveTasks",
"sqs:ReceiveMessage",
"sqs:SendMessage",
"sqs:GetQueueAttributes",
"sqs:SetQueueAttributes"
],
"Resource" : [
"arn:aws:sqs:*:*:SecurityLake_*",
"arn:aws:sqs:*:*:AmazonSecurityLakeManager-*"
],
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "AllowDataLakeManagement",
"Effect" : "Allow",
"Action" : [
"lakeformation:GetDataLakeSettings",
"lakeformation:ListPermissions"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
}
]
}