本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。
AmazonSecurityLakeAdministrator
描述:提供對 Amazon 安全湖的完整存取權,以及管理安全湖所需的相關服務。
AmazonSecurityLakeAdministrator
是AWS 受管理的策略。
使用此政策
您可以附加AmazonSecurityLakeAdministrator
至您的使用者、群組和角色。
政策詳情
-
類型: AWS 受管理的策略
-
創建時間:2023 年 5 月 30 日, 世界標準時間 22:04
-
編輯時間:世界標準時間 2024 年 2 月 23 日,16:01
-
ARN:
arn:aws:iam::aws:policy/AmazonSecurityLakeAdministrator
政策版本
策略版本:v2(預設值)
原則的預設版本是定義原則權限的版本。當具有策略的使用者或角色發出要求以存取 AWS 資源時,請 AWS 檢查原則的預設版本,以決定是否允許該要求。
政策文件
{
"Version" : "2012-10-17",
"Statement" : [
{
"Sid" : "AllowActionsWithAnyResource",
"Effect" : "Allow",
"Action" : [
"securitylake:*",
"organizations:DescribeOrganization",
"organizations:ListDelegatedServicesForAccount",
"organizations:ListAccounts",
"iam:ListRoles",
"ram:GetResourceShareAssociations"
],
"Resource" : "*"
},
{
"Sid" : "AllowActionsWithAnyResourceViaSecurityLake",
"Effect" : "Allow",
"Action" : [
"glue:CreateCrawler",
"glue:StopCrawlerSchedule",
"lambda:CreateEventSourceMapping",
"lakeformation:GrantPermissions",
"lakeformation:ListPermissions",
"lakeformation:RegisterResource",
"lakeformation:RevokePermissions",
"lakeformation:GetDatalakeSettings",
"events:ListConnections",
"events:ListApiDestinations",
"iam:GetRole",
"iam:ListAttachedRolePolicies",
"kms:DescribeKey"
],
"Resource" : "*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowManagingSecurityLakeS3Buckets",
"Effect" : "Allow",
"Action" : [
"s3:CreateBucket",
"s3:PutBucketPolicy",
"s3:PutBucketPublicAccessBlock",
"s3:PutBucketNotification",
"s3:PutBucketTagging",
"s3:PutEncryptionConfiguration",
"s3:PutBucketVersioning",
"s3:PutReplicationConfiguration",
"s3:PutLifecycleConfiguration",
"s3:ListBucket",
"s3:PutObject",
"s3:GetBucketNotification"
],
"Resource" : "arn:aws:s3:::aws-security-data-lake*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowLambdaCreateFunction",
"Effect" : "Allow",
"Action" : [
"lambda:CreateFunction"
],
"Resource" : [
"arn:aws:lambda:*:*:function:SecurityLake_Glue_Partition_Updater_Lambda*",
"arn:aws:lambda:*:*:function:AmazonSecurityLake*"
],
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowLambdaAddPermission",
"Effect" : "Allow",
"Action" : [
"lambda:AddPermission"
],
"Resource" : [
"arn:aws:lambda:*:*:function:SecurityLake_Glue_Partition_Updater_Lambda*",
"arn:aws:lambda:*:*:function:AmazonSecurityLake*"
],
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
},
"StringEquals" : {
"lambda:Principal" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowGlueActions",
"Effect" : "Allow",
"Action" : [
"glue:CreateDatabase",
"glue:GetDatabase",
"glue:CreateTable",
"glue:GetTable"
],
"Resource" : [
"arn:aws:glue:*:*:catalog",
"arn:aws:glue:*:*:database/amazon_security_lake_glue_db*",
"arn:aws:glue:*:*:table/amazon_security_lake_glue_db*/*"
],
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowEventBridgeActions",
"Effect" : "Allow",
"Action" : [
"events:PutTargets",
"events:PutRule",
"events:DescribeRule",
"events:CreateApiDestination",
"events:CreateConnection",
"events:UpdateConnection",
"events:UpdateApiDestination",
"events:DeleteConnection",
"events:DeleteApiDestination",
"events:ListTargetsByRule",
"events:RemoveTargets",
"events:DeleteRule"
],
"Resource" : [
"arn:aws:events:*:*:rule/AmazonSecurityLake*",
"arn:aws:events:*:*:rule/SecurityLake*",
"arn:aws:events:*:*:api-destination/AmazonSecurityLake*",
"arn:aws:events:*:*:connection/AmazonSecurityLake*"
],
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowSQSActions",
"Effect" : "Allow",
"Action" : [
"sqs:CreateQueue",
"sqs:SetQueueAttributes",
"sqs:GetQueueURL",
"sqs:AddPermission",
"sqs:GetQueueAttributes",
"sqs:DeleteQueue"
],
"Resource" : [
"arn:aws:sqs:*:*:SecurityLake*",
"arn:aws:sqs:*:*:AmazonSecurityLake*"
],
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowKmsCmkGrantForSecurityLake",
"Effect" : "Allow",
"Action" : "kms:CreateGrant",
"Resource" : "arn:aws:kms:*:*:key/*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
},
"StringLike" : {
"kms:EncryptionContext:aws:s3:arn" : "arn:aws:s3:::aws-security-data-lake*"
},
"ForAllValues:StringEquals" : {
"kms:GrantOperations" : [
"GenerateDataKey",
"RetireGrant",
"Decrypt"
]
}
}
},
{
"Sid" : "AllowEnablingQueryBasedSubscribers",
"Effect" : "Allow",
"Action" : [
"ram:CreateResourceShare",
"ram:AssociateResourceShare"
],
"Resource" : "*",
"Condition" : {
"StringLikeIfExists" : {
"ram:ResourceArn" : [
"arn:aws:glue:*:*:catalog",
"arn:aws:glue:*:*:database/amazon_security_lake_glue_db*",
"arn:aws:glue:*:*:table/amazon_security_lake_glue_db*/*"
]
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowConfiguringQueryBasedSubscribers",
"Effect" : "Allow",
"Action" : [
"ram:UpdateResourceShare",
"ram:GetResourceShares",
"ram:DisassociateResourceShare",
"ram:DeleteResourceShare"
],
"Resource" : "*",
"Condition" : {
"StringLike" : {
"ram:ResourceShareName" : "LakeFormation*"
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowConfiguringCredentialsForSubscriberNotification",
"Effect" : "Allow",
"Action" : [
"secretsmanager:CreateSecret",
"secretsmanager:GetSecretValue",
"secretsmanager:PutSecretValue"
],
"Resource" : "arn:aws:secretsmanager:*:*:secret:events!connection/AmazonSecurityLake-*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowPassRoleForUpdatingGluePartitionsSecLakeArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : [
"arn:aws:iam::*:role/service-role/AmazonSecurityLakeMetaStoreManager",
"arn:aws:iam::*:role/service-role/AmazonSecurityLakeMetaStoreManagerV2"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "lambda.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:securitylake:*:*:data-lake/default"
}
}
},
{
"Sid" : "AllowPassRoleForUpdatingGluePartitionsLambdaArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : [
"arn:aws:iam::*:role/service-role/AmazonSecurityLakeMetaStoreManager",
"arn:aws:iam::*:role/service-role/AmazonSecurityLakeMetaStoreManagerV2"
],
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "lambda.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : [
"arn:aws:lambda:*:*:function:SecurityLake_Glue_Partition_Updater_Lambda*",
"arn:aws:lambda:*:*:function:AmazonSecurityLake*"
]
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowPassRoleForCrossRegionReplicationSecLakeArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeS3ReplicationRole",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "s3.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:securitylake:*:*:data-lake/default"
}
}
},
{
"Sid" : "AllowPassRoleForCrossRegionReplicationS3Arn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeS3ReplicationRole",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "s3.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:s3:::aws-security-data-lake*"
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowPassRoleForCustomSourceCrawlerSecLakeArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeCustomDataGlueCrawler*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "glue.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:securitylake:*:*:data-lake/default"
}
}
},
{
"Sid" : "AllowPassRoleForCustomSourceCrawlerGlueArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeCustomDataGlueCrawler*",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "glue.amazonaws.com"
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowPassRoleForSubscriberNotificationSecLakeArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeSubscriberEventBridge",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "events.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:securitylake:*:*:subscriber/*"
}
}
},
{
"Sid" : "AllowPassRoleForSubscriberNotificationEventsArn",
"Effect" : "Allow",
"Action" : "iam:PassRole",
"Resource" : "arn:aws:iam::*:role/service-role/AmazonSecurityLakeSubscriberEventBridge",
"Condition" : {
"StringEquals" : {
"iam:PassedToService" : "events.amazonaws.com"
},
"StringLike" : {
"iam:AssociatedResourceARN" : "arn:aws:events:*:*:rule/AmazonSecurityLake*"
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowOnboardingToSecurityLakeDependencies",
"Effect" : "Allow",
"Action" : "iam:CreateServiceLinkedRole",
"Resource" : [
"arn:aws:iam::*:role/aws-service-role/securitylake.amazonaws.com/AWSServiceRoleForSecurityLake",
"arn:aws:iam::*:role/aws-service-role/lakeformation.amazonaws.com/AWSServiceRoleForLakeFormationDataAccess",
"arn:aws:iam::*:role/aws-service-role/apidestinations.events.amazonaws.com/AWSServiceRoleForAmazonEventBridgeApiDestinations"
],
"Condition" : {
"StringLike" : {
"iam:AWSServiceName" : [
"securitylake.amazonaws.com",
"lakeformation.amazonaws.com",
"apidestinations.events.amazonaws.com"
]
}
}
},
{
"Sid" : "AllowRolePolicyActionsforSubscibersandSources",
"Effect" : "Allow",
"Action" : [
"iam:CreateRole",
"iam:PutRolePolicy",
"iam:DeleteRolePolicy"
],
"Resource" : "arn:aws:iam::*:role/AmazonSecurityLake*",
"Condition" : {
"StringEquals" : {
"iam:PermissionsBoundary" : "arn:aws:iam::aws:policy/AmazonSecurityLakePermissionsBoundary"
},
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowRegisterS3LocationInLakeFormation",
"Effect" : "Allow",
"Action" : [
"iam:PutRolePolicy",
"iam:GetRolePolicy"
],
"Resource" : "arn:aws:iam::*:role/aws-service-role/lakeformation.amazonaws.com/AWSServiceRoleForLakeFormationDataAccess",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "AllowIAMActionsByResource",
"Effect" : "Allow",
"Action" : [
"iam:ListRolePolicies",
"iam:DeleteRole"
],
"Resource" : "arn:aws:iam::*:role/AmazonSecurityLake*",
"Condition" : {
"ForAnyValue:StringEquals" : {
"aws:CalledVia" : "securitylake.amazonaws.com"
}
}
},
{
"Sid" : "S3ReadAccessToSecurityLakes",
"Effect" : "Allow",
"Action" : [
"s3:Get*",
"s3:List*"
],
"Resource" : "arn:aws:s3:::aws-security-data-lake-*"
},
{
"Sid" : "S3ReadAccessToSecurityLakeMetastoreObject",
"Effect" : "Allow",
"Action" : [
"s3:GetObject",
"s3:GetObjectVersion"
],
"Resource" : "arn:aws:s3:::security-lake-meta-store-manager-*"
},
{
"Sid" : "S3ResourcelessReadOnly",
"Effect" : "Allow",
"Action" : [
"s3:GetAccountPublicAccessBlock",
"s3:ListAccessPoints",
"s3:ListAllMyBuckets"
],
"Resource" : "*"
}
]
}