本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonRDSFullAccess
說明:提 Amazon 透過 AWS Management Console.
AmazonRDSFullAccess
是AWS 受管理的策略。
使用此政策
您可以附加AmazonRDSFullAccess
至您的使用者、群組和角色。
政策詳情
-
類型: AWS 受管理的策略
-
創建時間:2015 年 2 月 6 日, 18:40 世界標準時間
-
編輯時間:世界標準時間 2023 年 8 月 17 日晚上 11 點
-
ARN:
arn:aws:iam::aws:policy/AmazonRDSFullAccess
政策版本
策略版本:v14(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{ "Version" : "2012-10-17", "Statement" : [ { "Effect" : "Allow", "Action" : [ "rds:*", "application-autoscaling:DeleteScalingPolicy", "application-autoscaling:DeregisterScalableTarget", "application-autoscaling:DescribeScalableTargets", "application-autoscaling:DescribeScalingActivities", "application-autoscaling:DescribeScalingPolicies", "application-autoscaling:PutScalingPolicy", "application-autoscaling:RegisterScalableTarget", "cloudwatch:DescribeAlarms", "cloudwatch:GetMetricStatistics", "cloudwatch:PutMetricAlarm", "cloudwatch:DeleteAlarms", "cloudwatch:ListMetrics", "cloudwatch:GetMetricData", "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeCoipPools", "ec2:DescribeInternetGateways", "ec2:DescribeLocalGatewayRouteTablePermissions", "ec2:DescribeLocalGatewayRouteTables", "ec2:DescribeLocalGatewayRouteTableVpcAssociations", "ec2:DescribeLocalGateways", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs", "ec2:GetCoipPoolUsage", "sns:ListSubscriptions", "sns:ListTopics", "sns:Publish", "logs:DescribeLogStreams", "logs:GetLogEvents", "outposts:GetOutpostInstanceTypes", "devops-guru:GetResourceCollection" ], "Resource" : "*" }, { "Effect" : "Allow", "Action" : "pi:*", "Resource" : [ "arn:aws:pi:*:*:metrics/rds/*", "arn:aws:pi:*:*:perf-reports/rds/*" ] }, { "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringLike" : { "iam:AWSServiceName" : [ "rds.amazonaws.com", "rds.application-autoscaling.amazonaws.com" ] } } }, { "Action" : [ "devops-guru:SearchInsights", "devops-guru:ListAnomaliesForInsight" ], "Effect" : "Allow", "Resource" : "*", "Condition" : { "ForAllValues:StringEquals" : { "devops-guru:ServiceNames" : [ "RDS" ] }, "Null" : { "devops-guru:ServiceNames" : "false" } } } ] }