本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity
描述:提供私人憑證授權單位、機 AWS 密管理員及其他代表您管理 ECS 服務 Connect TLS 功能 AWS 服務 所需的管理存取權。
AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity
是AWS 受管理的策略。
使用此政策
您可以附加AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity
至您的使用者、群組和角色。
政策詳情
-
類型:服務角色策略
-
創建時間:2024 年 1 月 19 日, 世界標準時間 20:08
-
編輯時間:世界標準時間 2024 年 1 月 19 日晚上 20:08
-
ARN:
arn:aws:iam::aws:policy/service-role/AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity
政策版本
策略版本:v1(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "CreateSecret",
"Effect" : "Allow",
"Action" : "secretsmanager:CreateSecret",
"Resource" : "arn:aws:secretsmanager:*:*:secret:ecs-sc!*",
"Condition" : {
"ArnLike" : {
"aws:RequestTag/AmazonECSCreated" : [
"arn:aws:ecs:*:*:service/*/*",
"arn:aws:ecs:*:*:task-set/*/*"
]
},
"StringEquals" : {
"aws:RequestTag/AmazonECSManaged" : "true",
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "TagOnCreateSecret",
"Effect" : "Allow",
"Action" : "secretsmanager:TagResource",
"Resource" : "arn:aws:secretsmanager:*:*:secret:ecs-sc!*",
"Condition" : {
"ArnLike" : {
"aws:RequestTag/AmazonECSCreated" : [
"arn:aws:ecs:*:*:service/*/*",
"arn:aws:ecs:*:*:task-set/*/*"
]
},
"StringEquals" : {
"aws:RequestTag/AmazonECSManaged" : "true",
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "RotateTLSCertificateSecret",
"Effect" : "Allow",
"Action" : [
"secretsmanager:DescribeSecret",
"secretsmanager:UpdateSecret",
"secretsmanager:GetSecretValue",
"secretsmanager:PutSecretValue",
"secretsmanager:DeleteSecret",
"secretsmanager:RotateSecret",
"secretsmanager:UpdateSecretVersionStage"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:ecs-sc!*",
"Condition" : {
"StringEquals" : {
"secretsmanager:ResourceTag/aws:secretsmanager:owningService" : "ecs-sc",
"aws:ResourceAccount" : "${aws:PrincipalAccount}"
}
}
},
{
"Sid" : "ManagePrivateCertificateAuthority",
"Effect" : "Allow",
"Action" : [
"acm-pca:GetCertificate",
"acm-pca:GetCertificateAuthorityCertificate",
"acm-pca:DescribeCertificateAuthority"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/AmazonECSManaged" : "true"
}
}
},
{
"Sid" : "ManagePrivateCertificateAuthorityForIssuingEndEntityCertificate",
"Effect" : "Allow",
"Action" : [
"acm-pca:IssueCertificate"
],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"aws:ResourceTag/AmazonECSManaged" : "true",
"acm-pca:TemplateArn" : "arn:aws:acm-pca:::template/EndEntityCertificate/V1"
}
}
}
]
}