Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.
SageMakerStudioUserIAMPermissiveExecutionPolicy
Descripción: Política de ejecución para el uso de funciones de IAM con SageMaker Unified Studio. Permite a los usuarios acceder a los recursos de su cuenta (incluido un amplio acceso a todos los APIs servicios de datos, como S3, Glue, CloudWatch Logs y otros) para el uso de SageMaker Unified Studio basado en IAM.
SageMakerStudioUserIAMPermissiveExecutionPolicy es una política administrada de AWS.
Uso de la política
Puede asociar SageMakerStudioUserIAMPermissiveExecutionPolicy a los usuarios, grupos y roles.
Información de la política
- 
                Tipo: política gestionada AWS 
- 
                Hora de creación: 18 de agosto de 2025 a las 17:19 UTC 
- 
                Hora editada: 26 de agosto de 2025 a las 21:34 UTC 
- 
                ARN: arn:aws:iam::aws:policy/SageMakerStudioUserIAMPermissiveExecutionPolicy
Versión de la política
Versión de la política: v2 (predeterminada)
La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita el acceso a un AWS recurso, AWS comprueba la versión predeterminada de la política para determinar si permite la solicitud.
Documento de política JSON
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "DataAccess", "Effect" : "Allow", "Action" : [ "cloudwatch:*", "glue:*", "logs:*", "redshift-data:*", "redshift-serverless:*", "redshift:*", "s3:*" ], "Resource" : "*" }, { "Sid" : "ComputeAccess", "Effect" : "Allow", "Action" : [ "athena:*", "bedrock:*", "codewhisperer:*", "q:*", "sagemaker:*", "scheduler:*", "sqlworkbench:*" ], "Resource" : "*" }, { "Sid" : "DataZone", "Effect" : "Allow", "Action" : [ "datazone:CreateAsset*", "datazone:CreateConnection", "datazone:CreateProject", "datazone:DeleteAsset*", "datazone:DeleteConnection", "datazone:DeleteProject", "datazone:Get*", "datazone:List*", "datazone:PostLineageEvent", "datazone:Search", "datazone:SearchListings", "datazone:SearchUserProfiles", "datazone:UpdateAssetFilter", "datazone:UpdateConnection", "datazone:UpdateProject" ], "Resource" : "*" }, { "Sid" : "IamSts", "Effect" : "Allow", "Action" : [ "iam:GetRole", "iam:ListRoles", "sts:AssumeRole" ], "Resource" : "*" }, { "Sid" : "CreateSLR", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : [ "arn:aws:iam::*:role/aws-service-role/neptune-graph.amazonaws.com/AWSServiceRoleForNeptuneGraph", "arn:aws:iam::*:role/aws-service-role/redshift.amazonaws.com/AWSServiceRoleForRedshift", "arn:aws:iam::*:role/aws-service-role/sagemaker.amazonaws.com/AWSServiceRoleForAmazonSageMakerNotebooks", "arn:aws:iam::*:role/aws-service-role/ops.emr-serverless.amazonaws.com/AWSServiceRoleForAmazonEMRServerless", "arn:aws:iam::*:role/aws-service-role/airflow.amazonaws.com/AWSServiceRoleForAmazonMWAA", "arn:aws:iam::*:role/aws-service-role/elasticmapreduce.amazonaws.com/AWSServiceRoleForEMRCleanup", "arn:aws:iam::*:role/aws-service-role/sagemaker.application-autoscaling.amazonaws.com/AWSServiceRoleForApplicationAutoScaling_SageMakerEndpoint", "arn:aws:iam::*:role/aws-service-role/observability.aoss.amazonaws.com/AWSServiceRoleForAmazonOpenSearchServerless" ] }, { "Sid" : "TagSession", "Effect" : "Allow", "Action" : "sts:TagSession", "Resource" : "*", "Condition" : { "ForAllValues:StringLike" : { "aws:TagKeys" : [ "AmazonDataZone*" ] } } }, { "Sid" : "PassRole", "Effect" : "Allow", "Action" : "iam:PassRole", "Resource" : [ "arn:aws:iam::*:role/service-role/AmazonSageMaker*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : [ "sagemaker.amazonaws.com", "lakeformation.amazonaws.com", "glue.amazonaws.com", "bedrock.amazonaws.com", "redshift-serverless.amazonaws.com", "redshift.amazonaws.com", "scheduler.amazonaws.com" ] } } }, { "Sid" : "SourceIdentity", "Effect" : "Allow", "Action" : "sts:SetSourceIdentity", "Resource" : "*", "Condition" : { "StringLike" : { "sts:SourceIdentity" : "${aws:PrincipalTag/datazone:userId}" } } }, { "Sid" : "SSM", "Effect" : "Allow", "Action" : [ "ssm:GetParameter*" ], "Resource" : [ "arn:aws:ssm:*:*:parameter/amazon/datazone/q*", "arn:aws:ssm:*:*:parameter/amazon/datazone/genAI/*", "arn:aws:ssm:*::parameter/aws/service/sagemaker-distribution/*" ] }, { "Sid" : "LFAccess", "Effect" : "Allow", "Action" : [ "lakeformation:DescribeResource", "lakeformation:GetDataAccess", "lakeformation:ListResources" ], "Resource" : "*" }, { "Sid" : "FederatedConn", "Effect" : "Allow", "Action" : [ "dynamodb:List*", "dynamodb:Describe*", "dynamodb:Scan", "dynamodb:PartiQLSelect", "dynamodb:Query", "secretsmanager:ListSecrets", "resource-groups:GetGroupQuery", "resource-groups:ListGroupResources" ], "Resource" : "*" }, { "Sid" : "PrivateSecret", "Effect" : "Allow", "Action" : [ "secretsmanager:DescribeSecret", "secretsmanager:GetSecretValue" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceTag/AmazonDataZoneProject" : "${datazone:projectId}" } } }, { "Sid" : "SharedSecret", "Effect" : "Allow", "Action" : [ "secretsmanager:DescribeSecret", "secretsmanager:GetSecretValue" ], "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceTag/for-use-with-all-datazone-projects" : "true" } } }, { "Sid" : "Ecr", "Effect" : "Allow", "Action" : [ "ecr:BatchCheckLayerAvailability", "ecr:BatchGetImage", "ecr:DescribeImages", "ecr:GetAuthorizationToken", "ecr:GetDownloadUrlForLayer" ], "Resource" : "*" } ] }