本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AWSPCSServiceRolePolicy
描述:授與代表PCS您管理資源的權限。
AWSPCSServiceRolePolicy
是AWS 受管理的策略。
使用此政策
此原則附加至服務連結角色,可讓服務代表您執行動作。您無法將此政策連接至使用者、群組或角色。
政策詳情
-
類型:服務連結角色原則
-
創作時間:二 ○ 二四年八月二十七日,下午 4 時 01 分 UTC
-
編輯時間:二 ○ 二四年八月二十七日,下午四時零一 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AWSPCSServiceRolePolicy
政策版本
策略版本:v1(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
JSON政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "PermissionsToCreatePCSNetworkInterfaces",
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface"
],
"Resource" : "arn:aws:ec2:*:*:network-interface/*",
"Condition" : {
"Null" : {
"aws:RequestTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToCreatePCSNetworkInterfacesInSubnet",
"Effect" : "Allow",
"Action" : [
"ec2:CreateNetworkInterface"
],
"Resource" : [
"arn:aws:ec2:*:*:subnet/*",
"arn:aws:ec2:*:*:security-group/*"
]
},
{
"Sid" : "PermissionsToManagePCSNetworkInterfaces",
"Effect" : "Allow",
"Action" : [
"ec2:DeleteNetworkInterface",
"ec2:CreateNetworkInterfacePermission"
],
"Resource" : "arn:aws:ec2:*:*:network-interface/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToDescribePCSResources",
"Effect" : "Allow",
"Action" : [
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
"ec2:DescribeNetworkInterfaces",
"ec2:DescribeLaunchTemplates",
"ec2:DescribeLaunchTemplateVersions",
"ec2:DescribeInstances",
"ec2:DescribeInstanceTypes",
"ec2:DescribeInstanceStatus",
"ec2:DescribeInstanceAttribute",
"ec2:DescribeSecurityGroups",
"ec2:DescribeKeyPairs",
"ec2:DescribeImages",
"ec2:DescribeImageAttribute"
],
"Resource" : "*"
},
{
"Sid" : "PermissionsToCreatePCSLaunchTemplates",
"Effect" : "Allow",
"Action" : [
"ec2:CreateLaunchTemplate"
],
"Resource" : "arn:aws:ec2:*:*:launch-template/*",
"Condition" : {
"Null" : {
"aws:RequestTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToManagePCSLaunchTemplates",
"Effect" : "Allow",
"Action" : [
"ec2:DeleteLaunchTemplate",
"ec2:DeleteLaunchTemplateVersions",
"ec2:CreateLaunchTemplateVersion"
],
"Resource" : "arn:aws:ec2:*:*:launch-template/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToTerminatePCSManagedInstances",
"Effect" : "Allow",
"Action" : [
"ec2:TerminateInstances"
],
"Resource" : "arn:aws:ec2:*:*:instance/*",
"Condition" : {
"Null" : {
"aws:ResourceTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToPassRoleToEC2",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : [
"arn:aws:iam::*:role/*/AWSPCS*",
"arn:aws:iam::*:role/AWSPCS*",
"arn:aws:iam::*:role/aws-pcs/*",
"arn:aws:iam::*:role/*/aws-pcs/*"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"ec2.amazonaws.com"
]
}
}
},
{
"Sid" : "PermissionsToControlClusterInstanceAttributes",
"Effect" : "Allow",
"Action" : [
"ec2:RunInstances",
"ec2:CreateFleet"
],
"Resource" : [
"arn:aws:ec2:*::image/*",
"arn:aws:ec2:*::snapshot/*",
"arn:aws:ec2:*:*:subnet/*",
"arn:aws:ec2:*:*:network-interface/*",
"arn:aws:ec2:*:*:security-group/*",
"arn:aws:ec2:*:*:volume/*",
"arn:aws:ec2:*:*:key-pair/*",
"arn:aws:ec2:*:*:launch-template/*",
"arn:aws:ec2:*:*:placement-group/*",
"arn:aws:ec2:*:*:capacity-reservation/*",
"arn:aws:resource-groups:*:*:group/*",
"arn:aws:ec2:*:*:fleet/*",
"arn:aws:ec2:*:*:spot-instances-request/*"
]
},
{
"Sid" : "PermissionsToProvisionClusterInstances",
"Effect" : "Allow",
"Action" : [
"ec2:RunInstances",
"ec2:CreateFleet"
],
"Resource" : [
"arn:aws:ec2:*:*:instance/*"
],
"Condition" : {
"Null" : {
"aws:RequestTag/AWSPCSManaged" : "false"
}
}
},
{
"Sid" : "PermissionsToTagPCSResources",
"Effect" : "Allow",
"Action" : [
"ec2:CreateTags"
],
"Resource" : [
"*"
],
"Condition" : {
"StringEquals" : {
"ec2:CreateAction" : [
"RunInstances",
"CreateLaunchTemplate",
"CreateFleet",
"CreateNetworkInterface"
]
}
}
},
{
"Sid" : "PermissionsToPublishMetrics",
"Effect" : "Allow",
"Action" : "cloudwatch:PutMetricData",
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"cloudwatch:namespace" : "AWS/PCS"
}
}
},
{
"Sid" : "PermissionsToManageSecret",
"Effect" : "Allow",
"Action" : [
"secretsmanager:DescribeSecret",
"secretsmanager:GetSecretValue",
"secretsmanager:PutSecretValue",
"secretsmanager:UpdateSecretVersionStage",
"secretsmanager:DeleteSecret"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:pcs!*",
"Condition" : {
"StringEquals" : {
"secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "pcs",
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
}
]
}