Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.
AmazonGuardDutyServiceRolePolicy
Descripción: Habilitar el acceso a AWS los recursos utilizados o administrados por Amazon Guard Duty
AmazonGuardDutyServiceRolePolicy
es una política administrada de AWS.
Uso de la política
Esta política está asociada a un rol vinculado a un servicio. Esto permite a dicho servicio realizar acciones por usted. No puede asociar esta política a los usuarios, grupos o roles.
Información de la política
-
Tipo: política de rol vinculado a un servicio
-
Hora de creación: 28 de noviembre de 2017 a las 20:12 UTC
-
Hora de edición: 12 de agosto de 2024 a las 20:01 h UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonGuardDutyServiceRolePolicy
Versión de la política
Versión de la política: v10 (predeterminado)
La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita el acceso a un AWS recurso, AWS comprueba la versión predeterminada de la política para determinar si permite la solicitud.
Documento de política JSON
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "GuardDutyGetDescribeListPolicy",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeInstances",
"ec2:DescribeImages",
"ec2:DescribeVpcEndpoints",
"ec2:DescribeSubnets",
"ec2:DescribeVpcPeeringConnections",
"ec2:DescribeTransitGatewayAttachments",
"organizations:ListAccounts",
"organizations:DescribeAccount",
"organizations:DescribeOrganization",
"s3:GetBucketPublicAccessBlock",
"s3:GetEncryptionConfiguration",
"s3:GetBucketTagging",
"s3:GetAccountPublicAccessBlock",
"s3:ListAllMyBuckets",
"s3:GetBucketAcl",
"s3:GetBucketPolicy",
"s3:GetBucketPolicyStatus",
"lambda:GetFunctionConfiguration",
"lambda:ListTags",
"eks:ListClusters",
"eks:DescribeCluster",
"ec2:DescribeVpcEndpointServices",
"ec2:DescribeVpcs",
"ec2:DescribeSecurityGroups",
"ecs:ListClusters",
"ecs:DescribeClusters"
],
"Resource" : "*"
},
{
"Sid" : "GuardDutyCreateSLRPolicy",
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "malware-protection.guardduty.amazonaws.com"
}
}
},
{
"Sid" : "GuardDutyCreateVpcEndpointPolicy",
"Effect" : "Allow",
"Action" : "ec2:CreateVpcEndpoint",
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "GuardDutyManaged"
},
"StringLike" : {
"ec2:VpceServiceName" : [
"com.amazonaws.*.guardduty-data",
"com.amazonaws.*.guardduty-data-fips"
]
}
}
},
{
"Sid" : "GuardDutyModifyDeleteVpcEndpointPolicy",
"Effect" : "Allow",
"Action" : [
"ec2:ModifyVpcEndpoint",
"ec2:DeleteVpcEndpoints"
],
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/GuardDutyManaged" : false
}
}
},
{
"Sid" : "GuardDutyCreateModifyVpcEndpointNetworkPolicy",
"Effect" : "Allow",
"Action" : [
"ec2:CreateVpcEndpoint",
"ec2:ModifyVpcEndpoint"
],
"Resource" : [
"arn:aws:ec2:*:*:vpc/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:subnet/*"
]
},
{
"Sid" : "GuardDutyCreateTagsDuringVpcEndpointCreationPolicy",
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*",
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : "CreateVpcEndpoint"
},
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "GuardDutyManaged"
}
}
},
{
"Sid" : "GuardDutySecurityGroupManagementPolicy",
"Effect" : "Allow",
"Action" : [
"ec2:AuthorizeSecurityGroupIngress",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:RevokeSecurityGroupIngress",
"ec2:RevokeSecurityGroupEgress",
"ec2:DeleteSecurityGroup"
],
"Resource" : "arn:aws:ec2:*:*:security-group/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/GuardDutyManaged" : false
}
}
},
{
"Sid" : "GuardDutyCreateSecurityGroupPolicy",
"Effect" : "Allow",
"Action" : "ec2:CreateSecurityGroup",
"Resource" : "arn:aws:ec2:*:*:security-group/*",
"Condition" : {
"StringLike" : {
"aws:RequestTag/GuardDutyManaged" : "*"
}
}
},
{
"Sid" : "GuardDutyCreateSecurityGroupForVpcPolicy",
"Effect" : "Allow",
"Action" : "ec2:CreateSecurityGroup",
"Resource" : "arn:aws:ec2:*:*:vpc/*"
},
{
"Sid" : "GuardDutyCreateTagsDuringSecurityGroupCreationPolicy",
"Effect" : "Allow",
"Action" : "ec2:CreateTags",
"Resource" : "arn:aws:ec2:*:*:security-group/*",
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : "CreateSecurityGroup"
},
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "GuardDutyManaged"
}
}
},
{
"Sid" : "GuardDutyCreateEksAddonPolicy",
"Effect" : "Allow",
"Action" : "eks:CreateAddon",
"Resource" : "arn:aws:eks:*:*:cluster/*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "GuardDutyManaged"
}
}
},
{
"Sid" : "GuardDutyEksAddonManagementPolicy",
"Effect" : "Allow",
"Action" : [
"eks:DeleteAddon",
"eks:UpdateAddon",
"eks:DescribeAddon"
],
"Resource" : "arn:aws:eks:*:*:addon/*/aws-guardduty-agent/*"
},
{
"Sid" : "GuardDutyEksClusterTagResourcePolicy",
"Effect" : "Allow",
"Action" : "eks:TagResource",
"Resource" : "arn:aws:eks:*:*:cluster/*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:TagKeys" : "GuardDutyManaged"
}
}
},
{
"Sid" : "GuardDutyEcsPutAccountSettingsDefaultPolicy",
"Effect" : "Allow",
"Action" : "ecs:PutAccountSettingDefault",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"ecs:account-setting" : [
"guardDutyActivate"
]
}
}
},
{
"Sid" : "SsmCreateDescribeUpdateDeleteStartAssociationPermission",
"Effect" : "Allow",
"Action" : [
"ssm:DescribeAssociation",
"ssm:DeleteAssociation",
"ssm:UpdateAssociation",
"ssm:CreateAssociation",
"ssm:StartAssociationsOnce"
],
"Resource" : "arn:aws:ssm:*:*:association/*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/GuardDutyManaged" : "true"
}
}
},
{
"Sid" : "SsmAddTagsToResourcePermission",
"Effect" : "Allow",
"Action" : [
"ssm:AddTagsToResource"
],
"Resource" : "arn:aws:ssm:*:*:association/*",
"Condition" : {
"ForAllValues:StringEquals" : {
"aws:TagKeys" : [
"GuardDutyManaged"
]
},
"StringEquals" : {
"aws:ResourceTag/GuardDutyManaged" : "true"
}
}
},
{
"Sid" : "SsmCreateUpdateAssociationInstanceDocumentPermission",
"Effect" : "Allow",
"Action" : [
"ssm:CreateAssociation",
"ssm:UpdateAssociation"
],
"Resource" : "arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin"
},
{
"Sid" : "SsmSendCommandPermission",
"Effect" : "Allow",
"Action" : "ssm:SendCommand",
"Resource" : [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin"
]
},
{
"Sid" : "SsmGetCommandStatus",
"Effect" : "Allow",
"Action" : "ssm:GetCommandInvocation",
"Resource" : "*"
}
]
}