Políticas de bucket do S3 para a nova experiência do Systems Manager
Este tópico inclui as políticas de bucket do Amazon S3 criadas pelo Systems Manager quando você integra uma organização ou conta única à nova experiência do Systems Manager.
Atenção
A modificação da política de bucket padrão pode permitir que as contas-membro de uma organização descubram umas as outras ou leiam os resultados de diagnóstico de instâncias em outra conta. Recomendamos ter muito cuidado ao optar por modificar essa política.
O bucket de diagnóstico é criado com a seguinte política de bucket padrão ao integrar uma organização ao Systems Manager.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "DenyHTTPRequests", "Effect": "Deny", "Principal": "*", "Action": "s3:*", "Resource": [ "arn:aws:s3:::", "arn:aws:s3:::
bucket-name
/*" ], "Condition": { "Bool": { "aws:SecureTransport": "false" } } }, { "Sid": "DenyNonSigV4Requests", "Effect": "Deny", "Principal": "*", "Action": "s3:*", "Resource": [ "arn:aws:s3:::bucket-name
", "arn:aws:s3:::bucket-name
/*" ], "Condition": { "StringNotEquals": { "s3:SignatureVersion": "AWS4-HMAC-SHA256" } } }, { "Sid": "AllowAccessLog", "Effect": "Allow", "Principal": { "Service": "logging.s3.amazonaws.com" }, "Action": "s3:PutObject", "Resource": "arn:aws:s3:::bucket-name
/access-logs/*", "Condition": { "StringEquals": { "aws:SourceAccount": "operational-account-id
" }, "ArnLike": { "aws:SourceArn": "arn:aws:s3:::bucket-name
" } } }, { "Sid": "AllowCrossAccountRead", "Effect": "Allow", "Principal": "*", "Action": "s3:GetObject", "Resource": "arn:aws:s3:::bucket-name
/actions/*/${aws:PrincipalAccount}/*", "Condition": { "StringEquals": { "aws:PrincipalOrgID": "organization-id
" } } }, { "Sid": "AllowCrossAccountWrite", "Effect": "Allow", "Principal": "*", "Action": [ "s3:PutObject", "s3:DeleteObject" ], "Resource": "arn:aws:s3:::bucket-name/actions/*/${aws:PrincipalAccount}/*", "Condition": { "StringEquals": { "aws:PrincipalOrgID": "organization-id" }, "ArnLike": { "aws:PrincipalArn": [ "arn:aws:iam::*:role/AWS-SSM-DiagnosisExecutionRole-operational-account-id-home-region
", "arn:aws:iam::*:role/AWS-SSM-DiagnosisAdminRole-operational-account-id-home-region
", "arn:aws:iam::*:role/AWS-SSM-RemediationExecutionRole-operational-account-id-home-region
", "arn:aws:iam::*:role/AWS-SSM-RemediationAdminRole-operational-account-id-home-region
" ] } } }, { "Sid": "AllowCrossAccountListUnderAccountOwnPrefix", "Effect": "Allow", "Principal": "*", "Action": "s3:ListBucket", "Resource": "arn:aws:s3:::bucket-name
", "Condition": { "StringEquals": { "aws:PrincipalOrgID": "organization-id
" }, "StringLike": { "s3:prefix": "*/${aws:PrincipalAccount}/*" } } }, { "Sid": "AllowCrossAccountGetConfigWithinOrganization", "Effect": "Allow", "Principal": "*", "Action": "s3:GetEncryptionConfiguration", "Resource": "arn:aws:s3:::bucket-name
", "Condition": { "StringEquals": { "aws:PrincipalOrgID": "organization-id
" } } } ] }
O bucket de diagnóstico é criado com a seguinte política de bucket padrão ao integrar uma conta única ao Systems Manager.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "DenyHTTPRequests", "Effect": "Deny", "Principal": "*", "Action": "s3:*", "Resource": [ "arn:aws:s3:::
bucket-name
", "arn:aws:s3:::bucket-name
/*" ], "Condition": { "Bool": { "aws:SecureTransport": "false" } } }, { "Sid": "DenyNonSigV4Requests", "Effect": "Deny", "Principal": "*", "Action": "s3:*", "Resource": [ "arn:aws:s3:::bucket-name
", "arn:aws:s3:::bucket-name
/*" ], "Condition": { "StringNotEquals": { "s3:SignatureVersion": "AWS4-HMAC-SHA256" } } } ] }