本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWS 的托管策略 AWS Trusted Advisor
Trusted Advisor 具有以下 AWS 托管策略。
目录
AWS 托管策略:AWSTrustedAdvisorPriorityFullAccess
这些区域有:AWSTrustedAdvisorPriorityFullAccess
权限详细信息
在第一条语句中,此策略包含 trustedadvisor
的以下权限:
-
描述您的账户和组织。
-
描述 Trusted Advisor 优先级中已识别的风险。这些权限允许您下载和更新风险状态。
-
描述您的 Trusted Advisor 优先电子邮件通知配置。这些权限允许您配置电子邮件通知,并为委派管理员禁用这些通知。
-
进行设置, Trusted Advisor 以便您的账户可以启用 AWS Organizations。
在第二条语句中,此策略包含 organizations
的以下权限:
-
描述您的 Trusted Advisor 账户和组织。
-
列出您允许使用 Organizations 的。 AWS 服务
在第三条语句中,此策略包含 organizations
的以下权限:
-
列出 Trusted Advisor 优先级的委派管理员。
-
启用和禁用 Organizations 的受信任访问。
在第四条语句中,此策略包含 iam
的以下权限:
-
创建
AWSServiceRoleForTrustedAdvisorReporting
服务相关角色。
在第五条语句中,此策略包含 organizations
的以下权限:
-
允许您注册和注销 Trusted Advisor Priority 的委派管理员。
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AWSTrustedAdvisorPriorityFullAccess", "Effect": "Allow", "Action": [ "trustedadvisor:DescribeAccount*", "trustedadvisor:DescribeOrganization", "trustedadvisor:DescribeRisk*", "trustedadvisor:DownloadRisk", "trustedadvisor:UpdateRiskStatus", "trustedadvisor:DescribeNotificationConfigurations", "trustedadvisor:UpdateNotificationConfigurations", "trustedadvisor:DeleteNotificationConfigurationForDelegatedAdmin", "trustedadvisor:SetOrganizationAccess" ], "Resource": "*" }, { "Sid": "AllowAccessForOrganization", "Effect": "Allow", "Action": [ "organizations:DescribeAccount", "organizations:DescribeOrganization", "organizations:ListAWSServiceAccessForOrganization" ], "Resource": "*" }, { "Sid": "AllowListDelegatedAdministrators", "Effect": "Allow", "Action": [ "organizations:ListDelegatedAdministrators", "organizations:EnableAWSServiceAccess", "organizations:DisableAWSServiceAccess" ], "Resource": "*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": [ "reporting.trustedadvisor.amazonaws.com" ] } } }, { "Sid": "AllowCreateServiceLinkedRole", "Effect": "Allow", "Action": "iam:CreateServiceLinkedRole", "Resource": "arn:aws:iam::*:role/aws-service-role/reporting.trustedadvisor.amazonaws.com/AWSServiceRoleForTrustedAdvisorReporting", "Condition": { "StringLike": { "iam:AWSServiceName": "reporting.trustedadvisor.amazonaws.com" } } }, { "Sid": "AllowRegisterDelegatedAdministrators", "Effect": "Allow", "Action": [ "organizations:RegisterDelegatedAdministrator", "organizations:DeregisterDelegatedAdministrator" ], "Resource": "arn:aws:organizations::*:*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": [ "reporting.trustedadvisor.amazonaws.com" ] } } } ] }
AWS 托管策略:AWSTrustedAdvisorPriorityReadOnlyAccess
这些区域有:AWSTrustedAdvisorPriorityReadOnlyAccess
权限详细信息
在第一条语句中,此策略包含 trustedadvisor
的以下权限:
-
描述您的 Trusted Advisor 账户和组织。
-
描述从 P Trusted Advisor riority 中识别出的风险并允许您下载它们。
-
描述 Trusted Advisor 优先电子邮件通知的配置。
在第二条和第三条语句中,此策略包含 organizations
的以下权限:
-
使用 Organizations 描述您的组织。
-
列出您允许使用 Organizations 的。 AWS 服务
-
列出 Trusted Advisor 优先级的委派管理员
{ "Version": "2012-10-17", "Statement": [ { "Sid": "AWSTrustedAdvisorPriorityReadOnlyAccess", "Effect": "Allow", "Action": [ "trustedadvisor:DescribeAccount*", "trustedadvisor:DescribeOrganization", "trustedadvisor:DescribeRisk*", "trustedadvisor:DownloadRisk", "trustedadvisor:DescribeNotificationConfigurations" ], "Resource": "*" }, { "Sid": "AllowAccessForOrganization", "Effect": "Allow", "Action": [ "organizations:DescribeOrganization", "organizations:ListAWSServiceAccessForOrganization" ], "Resource": "*" }, { "Sid": "AllowListDelegatedAdministrators", "Effect": "Allow", "Action": [ "organizations:ListDelegatedAdministrators" ], "Resource": "*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": [ "reporting.trustedadvisor.amazonaws.com" ] } } } ] }
AWS 托管策略:AWSTrustedAdvisorServiceRolePolicy
此策略附加到 AWSServiceRoleForTrustedAdvisor
服务相关角色。此角色允许服务相关角色为您执行操作。你无法附上 AWSTrustedAdvisorServiceRolePolicy
此策略授予管理权限,允许服务相关角色访问 AWS 服务。这些权限允许通过检查 Trusted Advisor 来评估您的账户。
权限详细信息
该策略包含以下权限。
-
accessanalyzer
— 描述 AWS Identity and Access Management Access Analyzer 资源 -
Auto Scaling
— 描述 Amazon A EC2 uto Scaling 账户配额和资源 -
cloudformation
— 描述 AWS CloudFormation (CloudFormation) 账户配额和堆栈 -
cloudfront
— 描述亚马逊的 CloudFront 分布 -
cloudtrail
— 描述 AWS CloudTrail (CloudTrail) 路径 -
dynamodb
– 描述 Amazon DynamoDB 账户配额和资源 -
dynamodbaccelerator
— 描述 DynamoDB 加速器资源 -
ec2
— 描述亚马逊弹性计算云 (AmazonEC2) 账户配额和资源 -
elasticloadbalancing
— 描述 Elastic Load Balancing (ELB) 账户配额和资源 -
iam
— 获取IAM资源,例如证书、密码策略和证书 -
networkfirewall
— 描述 AWS Network Firewall 资源 -
kinesis
– 描述 Amazon Kinesis (Kinesis) 账户配额 -
rds
— 描述亚马逊关系数据库服务 (AmazonRDS) 资源 -
redshift
– 描述 Amazon Redshift 资源 -
route53
– 描述 Amazon Route 53 账户配额和资源 -
s3
– 描述 Amazon Simple Storage Service (Amazon S3) 资源 -
ses
— 获取亚马逊简单电子邮件服务 (AmazonSES) 发送配额 -
sqs
— 列出亚马逊简单队列服务 (AmazonSQS) 队列 -
cloudwatch
— 获取 Amazon CloudWatch 事件(CloudWatch 事件)指标统计数据 -
ce
– 获取 Cost Explorer 服务 (Cost Explorer) 建议 -
route53resolver
— 获取 Amazon Route 53 Resolver 解析器端点和资源 -
kafka
– 获取 Amazon Managed Streaming for Apache Kafka 资源 -
ecs
— 获取 Amazon ECS 资源 -
outposts
— 获取 AWS Outposts 资源
{ "Version": "2012-10-17", "Statement": [ { "Sid" : "TrustedAdvisorServiceRolePermissions", "Effect": "Allow", "Action": [ "access-analyzer:ListAnalyzers" "autoscaling:DescribeAccountLimits", "autoscaling:DescribeAutoScalingGroups", "autoscaling:DescribeLaunchConfigurations", "ce:GetReservationPurchaseRecommendation", "ce:GetSavingsPlansPurchaseRecommendation", "cloudformation:DescribeAccountLimits", "cloudformation:DescribeStacks", "cloudformation:ListStacks", "cloudfront:ListDistributions", "cloudtrail:DescribeTrails", "cloudtrail:GetTrailStatus", "cloudtrail:GetTrail", "cloudtrail:ListTrails", "cloudtrail:GetEventSelectors", "cloudwatch:GetMetricStatistics", "cloudwatch:ListMetrics", "dax:DescribeClusters", "dynamodb:DescribeLimits", "dynamodb:DescribeTable", "dynamodb:ListTables", "ec2:DescribeAddresses", "ec2:DescribeReservedInstances", "ec2:DescribeInstances", "ec2:DescribeVpcs", "ec2:DescribeInternetGateways", "ec2:DescribeImages", "ec2:DescribeNatGateways", "ec2:DescribeVolumes", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeRegions", "ec2:DescribeReservedInstancesOfferings", "ec2:DescribeRouteTables", "ec2:DescribeSnapshots", "ec2:DescribeVpcEndpoints", "ec2:DescribeVpnConnections", "ec2:DescribeVpnGateways", "ec2:DescribeLaunchTemplateVersions", "ec2:GetManagedPrefixListEntries", "ecs:DescribeTaskDefinition", "ecs:ListTaskDefinitions" "elasticloadbalancing:DescribeAccountLimits", "elasticloadbalancing:DescribeInstanceHealth", "elasticloadbalancing:DescribeLoadBalancerAttributes", "elasticloadbalancing:DescribeLoadBalancerPolicies", "elasticloadbalancing:DescribeLoadBalancerPolicyTypes", "elasticloadbalancing:DescribeLoadBalancers", "elasticloadbalancing:DescribeListeners", "elasticloadbalancing:DescribeRules", "elasticloadbalancing:DescribeTargetGroups", "elasticloadbalancing:DescribeTargetHealth", "iam:GenerateCredentialReport", "iam:GetAccountPasswordPolicy", "iam:GetAccountSummary", "iam:GetCredentialReport", "iam:GetServerCertificate", "iam:ListServerCertificates", "iam:ListSAMLProviders", "kinesis:DescribeLimits", "kafka:DescribeClusterV2", "kafka:ListClustersV2", "kafka:ListNodes", "network-firewall:ListFirewalls", "network-firewall:DescribeFirewall", "outposts:GetOutpost", "outposts:ListAssets", "outposts:ListOutposts", "rds:DescribeAccountAttributes", "rds:DescribeDBClusters", "rds:DescribeDBEngineVersions", "rds:DescribeDBInstances", "rds:DescribeDBParameterGroups", "rds:DescribeDBParameters", "rds:DescribeDBSecurityGroups", "rds:DescribeDBSnapshots", "rds:DescribeDBSubnetGroups", "rds:DescribeEngineDefaultParameters", "rds:DescribeEvents", "rds:DescribeOptionGroupOptions", "rds:DescribeOptionGroups", "rds:DescribeOrderableDBInstanceOptions", "rds:DescribeReservedDBInstances", "rds:DescribeReservedDBInstancesOfferings", "rds:ListTagsForResource", "redshift:DescribeClusters", "redshift:DescribeReservedNodeOfferings", "redshift:DescribeReservedNodes", "route53:GetAccountLimit", "route53:GetHealthCheck", "route53:GetHostedZone", "route53:ListHealthChecks", "route53:ListHostedZones", "route53:ListHostedZonesByName", "route53:ListResourceRecordSets", "route53resolver:ListResolverEndpoints", "route53resolver:ListResolverEndpointIpAddresses", "s3:GetAccountPublicAccessBlock", "s3:GetBucketAcl", "s3:GetBucketPolicy", "s3:GetBucketPolicyStatus", "s3:GetBucketLocation", "s3:GetBucketLogging", "s3:GetBucketVersioning", "s3:GetBucketPublicAccessBlock", "s3:GetLifecycleConfiguration", "s3:ListBucket", "s3:ListAllMyBuckets", "ses:GetSendQuota", "sqs:GetQueueAttributes", "sqs:ListQueues" ], "Resource": "*" } ] }
AWS 托管策略:AWSTrustedAdvisorReportingServiceRolePolicy
此策略附加到AWSServiceRoleForTrustedAdvisorReporting
服务相关角色,该角色 Trusted Advisor 允许对组织视图功能执行操作。你无法附上 AWSTrustedAdvisorReportingServiceRolePolicy
此策略授予管理权限,允许服务相关角色执行 AWS Organizations 操作。
权限详细信息
该策略包含以下权限。
-
organizations
– 描述您的组织并列出服务访问权限、账户、父级、子级和组织单位
{ "Version": "2012-10-17", "Statement": [ { "Action": [ "organizations:DescribeOrganization", "organizations:ListAWSServiceAccessForOrganization", "organizations:ListAccounts", "organizations:ListAccountsForParent", "organizations:ListDelegatedAdministrators", "organizations:ListOrganizationalUnitsForParent", "organizations:ListChildren", "organizations:ListParents", "organizations:DescribeOrganizationalUnit", "organizations:DescribeAccount" ], "Effect": "Allow", "Resource": "*" } ] }
对 AWS 托管式策略的Trusted Advisor 更新
查看有关这些服务开始跟踪这些更改之前 AWS Support 和之 Trusted Advisor 后的 AWS 托管策略更新的详细信息。要获得有关此页面变更的自动提醒,请订RSS阅该文档历史记录页面上的订阅源。
下表描述了自 2021 年 8 月 10 日以来 Trusted Advisor 托管策略的重要更新。
更改 | 描述 | 日期 |
---|---|---|
AWSTrustedAdvisorServiceRolePolicy 更新现有政策。 |
Trusted Advisor 添加了新的操作来授予 |
2024年10月30日 |
AWSTrustedAdvisorServiceRolePolicy 更新现有政策。 |
Trusted Advisor 添加了新的操作来授予 |
2024 年 6 月 11 日 |
AWSTrustedAdvisorServiceRolePolicy 更新现有政策。 |
Trusted Advisor 添加了新的操作来授予 |
2024 年 1 月 18 日 |
AWSTrustedAdvisorPriorityFullAccess 更新现有政策。 |
Trusted Advisor 更新了 |
2023 年 12 月 6 日 |
AWSTrustedAdvisorPriorityReadOnlyAccess 更新现有政策。 |
Trusted Advisor 更新了 |
2023 年 12 月 6 日 |
AWSTrustedAdvisorServiceRolePolicy – 更新到现有策略 |
Trusted Advisor 添加了新的操作来授予 |
2023 年 11 月 9 日 |
AWSTrustedAdvisorServiceRolePolicy – 更新到现有策略 |
Trusted Advisor 在加入新的弹性检查中 |
2023 年 9 月 14 日 |
AWSTrustedAdvisorReportingServiceRolePolicy 附加到 Trusted Advisor |
将 Trusted Advisor |
2023 年 2 月 28 日 |
AWSTrustedAdvisorPriorityFullAccess 和 AWSTrustedAdvisorPriorityReadOnlyAccess 的新 AWS 托管策略 Trusted Advisor |
Trusted Advisor 添加了两个新的托管策略,您可以使用它们来控制对 Priority 的 Trusted Advisor 访问权限。 |
2022 年 8 月 17 日 |
AWSTrustedAdvisorServiceRolePolicy – 更新到现有策略 |
Trusted Advisor 添加了新的操作来授予 Auto Scaling 组运行状况检查需要 Amazon S3 存储桶权限检查需要 |
2021 年 8 月 10 日 |
已发布的更改日志 |
Trusted Advisor 开始跟踪其 AWS 托管策略的更改。 |
2021 年 8 月 10 日 |