本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSQuickSetupSSMManageResourcesExecutionPolicy
描述:此策略授予的权限允许 Systems Manager 创建先决条件,例如 Systems Manager 入职所需的 IAM 角色。
AWSQuickSetupSSMManageResourcesExecutionPolicy
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSQuickSetupSSMManageResourcesExecutionPolicy
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:世界标准时间 2024 年 11 月 15 日 22:49
-
编辑时间:世界标准时间 2024 年 11 月 15 日 22:49
-
ARN:
arn:aws:iam::aws:policy/AWSQuickSetupSSMManageResourcesExecutionPolicy
策略版本
策略版本:v1 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{
"Version" : "2012-10-17",
"Statement" : [
{
"Effect" : "Allow",
"Action" : [
"iam:CreateRole",
"iam:TagRole"
],
"Resource" : [
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableExplorer*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableDHMC*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-ManageInstanceProfile*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableAREX*"
],
"Condition" : {
"StringEquals" : {
"iam:ResourceTag/QuickSetupDocument" : "AWSQuickSetupType-SSM",
"aws:RequestTag/QuickSetupDocument" : "AWSQuickSetupType-SSM"
}
}
},
{
"Effect" : "Allow",
"Action" : [
"iam:DeleteRole",
"iam:GetRole",
"iam:GetRolePolicy",
"iam:UpdateRole"
],
"Resource" : [
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableExplorer*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableDHMC*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-ManageInstanceProfile*",
"arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableAREX*"
]
},
{
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:DetachRolePolicy"
],
"Condition" : {
"ArnEquals" : {
"iam:PolicyARN" : [
"arn:aws:iam::aws:policy/AWSSystemsManagerEnableExplorerExecutionPolicy"
]
}
},
"Resource" : "arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableExplorer*"
},
{
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:DetachRolePolicy"
],
"Condition" : {
"ArnEquals" : {
"iam:PolicyARN" : "arn:aws:iam::aws:policy/AWSQuickSetupEnableDHMCExecutionPolicy"
}
},
"Resource" : "arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableDHMC*"
},
{
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:DetachRolePolicy"
],
"Condition" : {
"ArnEquals" : {
"iam:PolicyARN" : "arn:aws:iam::aws:policy/AWSQuickSetupManagedInstanceProfileExecutionPolicy"
}
},
"Resource" : "arn:aws:iam::*:role/AWS-QuickSetup-SSM-ManageInstanceProfile*"
},
{
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:DetachRolePolicy"
],
"Condition" : {
"ArnEquals" : {
"iam:PolicyARN" : "arn:aws:iam::aws:policy/AWSQuickSetupEnableAREXExecutionPolicy"
}
},
"Resource" : "arn:aws:iam::*:role/AWS-QuickSetup-SSM-EnableAREX*"
},
{
"Effect" : "Allow",
"Action" : [
"s3:DeleteObject",
"s3:ListBucketVersions",
"s3:DeleteObjectVersion",
"s3:GetObjectVersion",
"s3:GetObject"
],
"Resource" : "arn:aws:s3:::do-not-delete-ssm-*",
"Condition" : {
"StringEquals" : {
"aws:ResourceAccount" : [
"${aws:PrincipalAccount}"
]
}
}
}
]
}