AWSQuickSetupDistributorPermissionsBoundary - AWS 受管理策略

本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。

AWSQuickSetupDistributorPermissionsBoundary

說明: QuickSetup 建立 IAM 角色,使其能夠代表您設定系統管理員代理商功能,並在建立此類角色來定義其權限界限時使用此政策。

AWSQuickSetupDistributorPermissionsBoundaryAWS 受管理的策略

使用此政策

您可以附加AWSQuickSetupDistributorPermissionsBoundary至您的使用者、群組和角色。

政策詳情

  • 類型: AWS 受管理的策略

  • 創建時間:2024 年 6 月 26 日, 09:50 世界標準時間

  • 編輯時間:2024 年 6 月 26 日, 09:50 世界標準時間

  • ARN: arn:aws:iam::aws:policy/AWSQuickSetupDistributorPermissionsBoundary

政策版本

策略版本:v1(預設值)

原則的預設版本是定義原則權限的版本。當具有該策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本以決定是否允許該要求。

政策文件

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "DistributorAutomationRoleGetPermissions", "Effect" : "Allow", "Action" : [ "iam:GetRole" ], "Resource" : [ "arn:aws:iam::*:role/AWS-QuickSetup-RoleForDistributor-*" ] }, { "Sid" : "DistributorAutomationRolePassPermissions", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/AWS-QuickSetup-RoleForDistributor-*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "ssm.amazonaws.com" ] } } }, { "Sid" : "DefaultInstanceRoleManagePermissions", "Effect" : "Allow", "Action" : [ "iam:CreateRole", "iam:DeleteRole", "iam:UpdateRole", "iam:GetRole" ], "Condition" : { "StringLike" : { "aws:PrincipalTag/QuickSetupManagerID" : "*" }, "ArnLike" : { "aws:PrincipalArn" : "arn:aws:iam::*:role/AWS-QuickSetup-RoleForDistributor-*" } }, "Resource" : [ "arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup" ] }, { "Sid" : "DefaultInstanceRolePassToEC2Permissions", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "ec2.amazonaws.com" ] } } }, { "Sid" : "DefaultInstanceRolePassToSSMPermissions", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "ssm.amazonaws.com" ] } } }, { "Sid" : "InstanceManagementPoliciesAttachPermissions", "Effect" : "Allow", "Action" : [ "iam:AttachRolePolicy", "iam:DetachRolePolicy" ], "Condition" : { "ArnEquals" : { "iam:PolicyARN" : [ "arn:aws:iam::aws:policy/AmazonElasticFileSystemsUtils", "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" ] }, "StringLike" : { "aws:PrincipalTag/QuickSetupManagerID" : "*" }, "ArnLike" : { "aws:PrincipalArn" : "arn:aws:iam::*:role/AWS-QuickSetup-RoleForDistributor-*" } }, "Resource" : "arn:aws:iam::*:role/*" }, { "Sid" : "CreateSystemsManagerSLRPermissions", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/ssm.amazonaws.com/AWSServiceRoleForAmazonSSM" ], "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "ssm.amazonaws.com" } } }, { "Sid" : "DefaultInstanceRoleAddPermissions", "Effect" : "Allow", "Action" : [ "iam:AddRoleToInstanceProfile" ], "Resource" : [ "*" ] }, { "Sid" : "IAMReadOnlyPermissions", "Effect" : "Allow", "Action" : [ "iam:GetInstanceProfile", "iam:GetRolePolicy", "iam:ListInstanceProfilesForRole", "iam:ListRoles" ], "Resource" : [ "*" ] }, { "Sid" : "DefaultInstanceProfileCreatePermissions", "Effect" : "Allow", "Action" : [ "iam:CreateInstanceProfile" ], "Resource" : [ "arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup" ] }, { "Sid" : "DefaultInstanceProfileAssociationPermissions", "Effect" : "Allow", "Action" : [ "ec2:AssociateIamInstanceProfile" ], "Resource" : "*", "Condition" : { "Null" : { "ec2:InstanceProfile" : "true" }, "ArnLike" : { "ec2:NewInstanceProfile" : "arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup" } } }, { "Sid" : "DefaultInstanceProfileDisassociationPermissions", "Effect" : "Allow", "Action" : [ "ec2:DisassociateIamInstanceProfile" ], "Resource" : "*", "Condition" : { "ArnLike" : { "ec2:InstanceProfile" : "arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup" } } }, { "Sid" : "ConfigurationAutomationsStartPermissions", "Effect" : "Allow", "Action" : [ "ssm:StartAutomationExecution" ], "Resource" : [ "arn:aws:ssm:*:*:automation-definition/AWSQuickSetup-Distributor-*", "arn:aws:ssm:*:*:automation-definition/UpdateCloudWatchDocument-Distributor-*", "arn:aws:ssm:*:*:automation-definition/AWS-ConfigureAWSPackage*", "arn:aws:ssm:*:*:automation-definition/AWS-AttachIAMToInstance*" ] }, { "Sid" : "ReadOnlyPermissionsForEnablingHostManagementBySSM", "Effect" : "Allow", "Action" : [ "ssm:ListTagsForResource", "ssm:GetAutomationExecution", "ec2:DescribeIamInstanceProfileAssociations", "ec2:DescribeInstances" ], "Resource" : "*" }, { "Sid" : "ReadOnlyPermissionsForEnablingExplorer", "Effect" : "Allow", "Action" : [ "config:DescribeConfigurationRecorders", "compute-optimizer:GetEnrollmentStatus", "support:DescribeTrustedAdvisorChecks" ], "Resource" : "*" }, { "Sid" : "SSMExplorerServiceSettingsPermissions", "Effect" : "Allow", "Action" : [ "ssm:UpdateServiceSetting", "ssm:GetServiceSetting" ], "Resource" : [ "arn:aws:ssm:*:*:servicesetting/ssm/opsitem/ssm-patchmanager", "arn:aws:ssm:*:*:servicesetting/ssm/opsitem/EC2", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ExplorerOnboarded", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/Association", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ComputeOptimizer", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ConfigCompliance", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/OpsData-TrustedAdvisor", "arn:aws:ssm:*:*:servicesetting/ssm/opsdata/SupportCenterCase" ] } ] }

進一步了解