本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AWSQuickSetupSSMHostMgmtPermissionsBoundary
描述:快速設定會建立 IAM 角色,讓它能夠代表您設定 Host Manager 快速設定類型,並在建立此類角色時使用此政策來定義其權限的界限。
AWSQuickSetupSSMHostMgmtPermissionsBoundary
是AWS 受管理的策略。
使用此政策
您可以附加AWSQuickSetupSSMHostMgmtPermissionsBoundary
至您的使用者、群組和角色。
政策詳情
-
類型: AWS 受管理的策略
-
創建時間:2024 年 6 月 26 日, 09:48 世界標準時間
-
編輯時間:2024 年 6 月 26 日, 09:48 世界標準時間
-
ARN:
arn:aws:iam::aws:policy/AWSQuickSetupSSMHostMgmtPermissionsBoundary
政策版本
策略版本:v1(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "HostManagementAutomationRoleGetPermissions",
"Effect" : "Allow",
"Action" : [
"iam:GetRole"
],
"Resource" : [
"arn:aws:iam::*:role/AWS-QuickSetup-HostMgmtRole-*"
]
},
{
"Sid" : "HostManagementAutomationRolePassPermissions",
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : [
"arn:aws:iam::*:role/AWS-QuickSetup-HostMgmtRole-*"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"ssm.amazonaws.com"
]
}
}
},
{
"Sid" : "DefaultInstanceRoleManagePermissions",
"Effect" : "Allow",
"Action" : [
"iam:CreateRole",
"iam:DeleteRole",
"iam:UpdateRole",
"iam:GetRole"
],
"Resource" : [
"arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup"
],
"Condition" : {
"StringLike" : {
"aws:PrincipalTag/QuickSetupManagerID" : "*"
},
"ArnLike" : {
"aws:PrincipalArn" : "arn:aws:iam::*:role/AWS-QuickSetup-HostMgmtRole-*"
}
}
},
{
"Sid" : "DefaultInstanceRolePassToEC2Permissions",
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : [
"arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"ec2.amazonaws.com"
]
}
}
},
{
"Sid" : "DefaultInstanceRolePassToSSMPermissions",
"Effect" : "Allow",
"Action" : [
"iam:PassRole"
],
"Resource" : [
"arn:aws:iam::*:role/AmazonSSMRoleForInstancesQuickSetup"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : [
"ssm.amazonaws.com"
]
}
}
},
{
"Sid" : "InstanceManagementPoliciesAttachPermissions",
"Effect" : "Allow",
"Action" : [
"iam:AttachRolePolicy",
"iam:DetachRolePolicy"
],
"Condition" : {
"ArnEquals" : {
"iam:PolicyARN" : [
"arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore",
"arn:aws:iam::aws:policy/AmazonSSMPatchAssociation"
]
},
"StringLike" : {
"aws:PrincipalTag/QuickSetupManagerID" : "*"
},
"ArnLike" : {
"aws:PrincipalArn" : "arn:aws:iam::*:role/AWS-QuickSetup-HostMgmtRole-*"
}
},
"Resource" : "arn:aws:iam::*:role/*"
},
{
"Sid" : "CreateSystemsManagerSLRPermissions",
"Effect" : "Allow",
"Action" : [
"iam:CreateServiceLinkedRole"
],
"Resource" : [
"arn:aws:iam::*:role/aws-service-role/ssm.amazonaws.com/AWSServiceRoleForAmazonSSM"
],
"Condition" : {
"StringEquals" : {
"iam:AWSServiceName" : "ssm.amazonaws.com"
}
}
},
{
"Sid" : "DefaultInstanceRoleAddPermissions",
"Effect" : "Allow",
"Action" : [
"iam:AddRoleToInstanceProfile"
],
"Resource" : [
"*"
]
},
{
"Sid" : "IAMReadOnlyPermissions",
"Effect" : "Allow",
"Action" : [
"iam:GetInstanceProfile",
"iam:GetRolePolicy",
"iam:ListInstanceProfilesForRole",
"iam:ListRoles"
],
"Resource" : [
"*"
]
},
{
"Sid" : "DefaultInstanceProfileCreatePermissions",
"Effect" : "Allow",
"Action" : [
"iam:CreateInstanceProfile"
],
"Resource" : [
"arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup"
]
},
{
"Sid" : "DefaultInstanceProfileAssociationPermissions",
"Effect" : "Allow",
"Action" : [
"ec2:AssociateIamInstanceProfile"
],
"Resource" : "*",
"Condition" : {
"Null" : {
"ec2:InstanceProfile" : "true"
},
"ArnLike" : {
"ec2:NewInstanceProfile" : "arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup"
}
}
},
{
"Sid" : "DefaultInstanceProfileDisassociationPermissions",
"Effect" : "Allow",
"Action" : [
"ec2:DisassociateIamInstanceProfile"
],
"Resource" : "*",
"Condition" : {
"ArnLike" : {
"ec2:InstanceProfile" : "arn:aws:iam::*:instance-profile/AmazonSSMRoleForInstancesQuickSetup"
}
}
},
{
"Sid" : "ConfigurationAutomationsStartPermissions",
"Effect" : "Allow",
"Action" : [
"ssm:StartAutomationExecution"
],
"Resource" : [
"arn:aws:ssm:*:*:automation-definition/AWSQuickSetup-HostMgmt-*",
"arn:aws:ssm:*:*:automation-definition/AWSQuickSetup-CreateAndAttachIAMToInstance-*",
"arn:aws:ssm:*:*:automation-definition/AWSQuickSetup-UpdateExistingInstanceProfile-*",
"arn:aws:ssm:*:*:automation-definition/AWSQuickSetup-InstallAndManageCloudWatchDocument-*",
"arn:aws:ssm:*:*:automation-definition/UpdateCloudWatchDocument-*",
"arn:aws:ssm:*:*:automation-definition/AWSEC2-UpdateLaunchAgent-*",
"arn:aws:ssm:*:*:automation-definition/AWS-AttachIAMToInstance*",
"arn:aws:ssm:*:*:automation-definition/AWS-GatherSoftwareInventory*",
"arn:aws:ssm:*:*:automation-definition/AWS-RunPatchBaselineAssociation*",
"arn:aws:ssm:*:*:automation-definition/AWS-UpdateSSMAgent*"
]
},
{
"Sid" : "ReadOnlyPermissionsForEnablingHostManagementBySSM",
"Effect" : "Allow",
"Action" : [
"ssm:ListTagsForResource",
"ssm:GetAutomationExecution",
"ec2:DescribeIamInstanceProfileAssociations",
"ec2:DescribeInstances"
],
"Resource" : "*"
},
{
"Sid" : "ReadOnlyPermissionsForEnablingExplorer",
"Effect" : "Allow",
"Action" : [
"config:DescribeConfigurationRecorders",
"compute-optimizer:GetEnrollmentStatus",
"support:DescribeTrustedAdvisorChecks"
],
"Resource" : "*"
},
{
"Sid" : "SSMExplorerServiceSettingsPermissions",
"Effect" : "Allow",
"Action" : [
"ssm:UpdateServiceSetting",
"ssm:GetServiceSetting"
],
"Resource" : [
"arn:aws:ssm:*:*:servicesetting/ssm/opsitem/ssm-patchmanager",
"arn:aws:ssm:*:*:servicesetting/ssm/opsitem/EC2",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ExplorerOnboarded",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/Association",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ComputeOptimizer",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/ConfigCompliance",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/OpsData-TrustedAdvisor",
"arn:aws:ssm:*:*:servicesetting/ssm/opsdata/SupportCenterCase"
]
}
]
}