本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonRDSFullAccess
說明:提 Amazon 透過 AWS Management Console.
AmazonRDSFullAccess
是AWS 受管理的策略。
使用此政策
您可以附加AmazonRDSFullAccess
至您的使用者、群組和角色。
政策詳情
-
類型: AWS 受管理的策略
-
創建時間:2015 年 2 月 6 日, 18:40 世界標準時間
-
編輯時間:世界標準時間 2023 年 8 月 17 日晚上 11 點
-
ARN:
arn:aws:iam::aws:policy/AmazonRDSFullAccess
政策版本
策略版本:v14(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"rds:*",
"application-autoscaling:DeleteScalingPolicy",
"application-autoscaling:DeregisterScalableTarget",
"application-autoscaling:DescribeScalableTargets",
"application-autoscaling:DescribeScalingActivities",
"application-autoscaling:DescribeScalingPolicies",
"application-autoscaling:PutScalingPolicy",
"application-autoscaling:RegisterScalableTarget",
"cloudwatch:DescribeAlarms",
"cloudwatch:GetMetricStatistics",
"cloudwatch:PutMetricAlarm",
"cloudwatch:DeleteAlarms",
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricData",
"ec2:DescribeAccountAttributes",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeCoipPools",
"ec2:DescribeInternetGateways",
"ec2:DescribeLocalGatewayRouteTablePermissions",
"ec2:DescribeLocalGatewayRouteTables",
"ec2:DescribeLocalGatewayRouteTableVpcAssociations",
"ec2:DescribeLocalGateways",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcAttribute",
"ec2:DescribeVpcs",
"ec2:GetCoipPoolUsage",
"sns:ListSubscriptions",
"sns:ListTopics",
"sns:Publish",
"logs:DescribeLogStreams",
"logs:GetLogEvents",
"outposts:GetOutpostInstanceTypes",
"devops-guru:GetResourceCollection"
],
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : "pi:*",
"Resource" : [
"arn:aws:pi:*:*:metrics/rds/*",
"arn:aws:pi:*:*:perf-reports/rds/*"
]
},
{
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "*",
"Condition" : {
"StringLike" : {
"iam:AWSServiceName" : [
"rds.amazonaws.com",
"rds.application-autoscaling.amazonaws.com"
]
}
}
},
{
"Action" : [
"devops-guru:SearchInsights",
"devops-guru:ListAnomaliesForInsight"
],
"Effect" : "Allow",
"Resource" : "*",
"Condition" : {
"ForAllValues:StringEquals" : {
"devops-guru:ServiceNames" : [
"RDS"
]
},
"Null" : {
"devops-guru:ServiceNames" : "false"
}
}
}
]
}