翻訳は機械翻訳により提供されています。提供された翻訳内容と英語版の間で齟齬、不一致または矛盾がある場合、英語版が優先します。
AWSOpsWorksCMServiceRole
説明: OpsWorks CM サーバーの作成に使用されるサービスロールポリシー。
AWSOpsWorksCMServiceRole
は AWS マネージドポリシーです。
このポリシーを使用すると
ユーザー、グループおよびロールに AWSOpsWorksCMServiceRole
をアタッチできます。
ポリシーの詳細
-
タイプ: サービスロールポリシー
-
作成日時: 2016 年 11 月 24 日 09:49 UTC
-
編集日時: 2021 年 4 月 23 日 17:32 UTC
-
ARN:
arn:aws:iam::aws:policy/service-role/AWSOpsWorksCMServiceRole
ポリシーのバージョン
ポリシーのバージョン: v14 (デフォルト)
ポリシーのデフォルトバージョンは、ポリシーのアクセス許可を定義するバージョンです。ポリシーを持つユーザーまたはロールが AWS リソースへのアクセスをリクエストすると、 はポリシーのデフォルトバージョン AWS をチェックして、リクエストを許可するかどうかを決定します。
JSON ポリシードキュメント
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Resource" : [
"arn:aws:s3:::aws-opsworks-cm-*"
],
"Action" : [
"s3:CreateBucket",
"s3:DeleteObject",
"s3:DeleteBucket",
"s3:GetObject",
"s3:ListBucket",
"s3:PutBucketPolicy",
"s3:PutObject",
"s3:GetBucketTagging",
"s3:PutBucketTagging"
]
},
{
"Effect" : "Allow",
"Resource" : [
"*"
],
"Action" : [
"tag:UntagResources",
"tag:TagResources"
]
},
{
"Effect" : "Allow",
"Resource" : [
"*"
],
"Action" : [
"ssm:DescribeInstanceInformation",
"ssm:GetCommandInvocation",
"ssm:ListCommandInvocations",
"ssm:ListCommands"
]
},
{
"Effect" : "Allow",
"Resource" : [
"*"
],
"Condition" : {
"StringLike" : {
"ssm:resourceTag/aws:cloudformation:stack-name" : "aws-opsworks-cm-*"
}
},
"Action" : [
"ssm:SendCommand"
]
},
{
"Effect" : "Allow",
"Resource" : [
"arn:aws:ssm:*::document/*",
"arn:aws:s3:::aws-opsworks-cm-*"
],
"Action" : [
"ssm:SendCommand"
]
},
{
"Effect" : "Allow",
"Resource" : [
"*"
],
"Action" : [
"ec2:AllocateAddress",
"ec2:AssociateAddress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:CreateImage",
"ec2:CreateSecurityGroup",
"ec2:CreateSnapshot",
"ec2:CreateTags",
"ec2:DeleteSecurityGroup",
"ec2:DeleteSnapshot",
"ec2:DeregisterImage",
"ec2:DescribeAccountAttributes",
"ec2:DescribeAddresses",
"ec2:DescribeImages",
"ec2:DescribeInstanceStatus",
"ec2:DescribeInstances",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSnapshots",
"ec2:DescribeSubnets",
"ec2:DisassociateAddress",
"ec2:ReleaseAddress",
"ec2:RunInstances",
"ec2:StopInstances"
]
},
{
"Effect" : "Allow",
"Resource" : [
"*"
],
"Condition" : {
"StringLike" : {
"ec2:ResourceTag/aws:cloudformation:stack-name" : "aws-opsworks-cm-*"
}
},
"Action" : [
"ec2:TerminateInstances",
"ec2:RebootInstances"
]
},
{
"Effect" : "Allow",
"Resource" : [
"arn:aws:opsworks-cm:*:*:server/*"
],
"Action" : [
"opsworks-cm:DeleteServer",
"opsworks-cm:StartMaintenance"
]
},
{
"Effect" : "Allow",
"Resource" : [
"arn:aws:cloudformation:*:*:stack/aws-opsworks-cm-*"
],
"Action" : [
"cloudformation:CreateStack",
"cloudformation:DeleteStack",
"cloudformation:DescribeStackEvents",
"cloudformation:DescribeStackResources",
"cloudformation:DescribeStacks",
"cloudformation:UpdateStack"
]
},
{
"Effect" : "Allow",
"Resource" : [
"arn:aws:iam::*:role/aws-opsworks-cm-*",
"arn:aws:iam::*:role/service-role/aws-opsworks-cm-*"
],
"Action" : [
"iam:PassRole"
]
},
{
"Effect" : "Allow",
"Resource" : "*",
"Action" : [
"acm:DeleteCertificate",
"acm:ImportCertificate"
]
},
{
"Effect" : "Allow",
"Resource" : "arn:aws:secretsmanager:*:*:opsworks-cm!aws-opsworks-cm-secrets-*",
"Action" : [
"secretsmanager:CreateSecret",
"secretsmanager:GetSecretValue",
"secretsmanager:UpdateSecret",
"secretsmanager:DeleteSecret",
"secretsmanager:TagResource",
"secretsmanager:UntagResource"
]
},
{
"Effect" : "Allow",
"Action" : "ec2:DeleteTags",
"Resource" : [
"arn:aws:ec2:*:*:instance/*",
"arn:aws:ec2:*:*:elastic-ip/*",
"arn:aws:ec2:*:*:security-group/*"
]
}
]
}