本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonRedshiftFullAccess
描述:通过提供对亚马逊 Redshift 的完全访问权限。 AWS Management Console
AmazonRedshiftFullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonRedshiftFullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2015 年 2 月 6 日 18:40 UTC
-
编辑时间:2022 年 7 月 7 日 23:31 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonRedshiftFullAccess
策略版本
策略版本:v5 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{
"Version" : "2012-10-17",
"Statement" : [
{
"Action" : [
"redshift:*",
"redshift-serverless:*",
"ec2:DescribeAccountAttributes",
"ec2:DescribeAddresses",
"ec2:DescribeAvailabilityZones",
"ec2:DescribeSecurityGroups",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"ec2:DescribeInternetGateways",
"sns:CreateTopic",
"sns:Get*",
"sns:List*",
"cloudwatch:Describe*",
"cloudwatch:Get*",
"cloudwatch:List*",
"cloudwatch:PutMetricAlarm",
"cloudwatch:EnableAlarmActions",
"cloudwatch:DisableAlarmActions",
"tag:GetResources",
"tag:UntagResources",
"tag:GetTagValues",
"tag:GetTagKeys",
"tag:TagResources"
],
"Effect" : "Allow",
"Resource" : "*"
},
{
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : "arn:aws:iam::*:role/aws-service-role/redshift.amazonaws.com/AWSServiceRoleForRedshift",
"Condition" : {
"StringLike" : {
"iam:AWSServiceName" : "redshift.amazonaws.com"
}
}
},
{
"Sid" : "DataAPIPermissions",
"Action" : [
"redshift-data:ExecuteStatement",
"redshift-data:CancelStatement",
"redshift-data:ListStatements",
"redshift-data:GetStatementResult",
"redshift-data:DescribeStatement",
"redshift-data:ListDatabases",
"redshift-data:ListSchemas",
"redshift-data:ListTables",
"redshift-data:DescribeTable"
],
"Effect" : "Allow",
"Resource" : "*"
},
{
"Sid" : "SecretsManagerListPermissions",
"Action" : [
"secretsmanager:ListSecrets"
],
"Effect" : "Allow",
"Resource" : "*"
},
{
"Sid" : "SecretsManagerCreateGetPermissions",
"Action" : [
"secretsmanager:CreateSecret",
"secretsmanager:GetSecretValue",
"secretsmanager:TagResource"
],
"Effect" : "Allow",
"Resource" : "*",
"Condition" : {
"StringLike" : {
"secretsmanager:ResourceTag/RedshiftDataFullAccess" : "*"
}
}
}
]
}