Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà.
AmazonGuardDutyServiceRolePolicy
Descrizione: Abilita l'accesso alle AWS risorse utilizzate o gestite da Amazon Guard Duty
AmazonGuardDutyServiceRolePolicy
è una politica AWS gestita.
Utilizzo di questa politica
Questa policy è associata a un ruolo collegato al servizio che consente al servizio di eseguire azioni per conto dell'utente. Non puoi collegare questa policy ai tuoi utenti, gruppi o ruoli.
Dettagli della politica
-
Tipo: politica relativa ai ruoli collegati ai servizi
-
Ora di creazione: 28 novembre 2017, 20:12 UTC
-
Ora modificata: 12 agosto 2024, 20:01 UTC
-
ARN:
arn:aws:iam::aws:policy/aws-service-role/AmazonGuardDutyServiceRolePolicy
Versione della politica
Versione della politica: v10 (default) (predefinito)
La versione predefinita della politica è la versione che definisce le autorizzazioni per la politica. Quando un utente o un ruolo con la politica effettua una richiesta di accesso a una AWS risorsa, AWS controlla la versione predefinita della politica per determinare se consentire la richiesta.
Documento di policy JSON
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "GuardDutyGetDescribeListPolicy", "Effect" : "Allow", "Action" : [ "ec2:DescribeInstances", "ec2:DescribeImages", "ec2:DescribeVpcEndpoints", "ec2:DescribeSubnets", "ec2:DescribeVpcPeeringConnections", "ec2:DescribeTransitGatewayAttachments", "organizations:ListAccounts", "organizations:DescribeAccount", "organizations:DescribeOrganization", "s3:GetBucketPublicAccessBlock", "s3:GetEncryptionConfiguration", "s3:GetBucketTagging", "s3:GetAccountPublicAccessBlock", "s3:ListAllMyBuckets", "s3:GetBucketAcl", "s3:GetBucketPolicy", "s3:GetBucketPolicyStatus", "lambda:GetFunctionConfiguration", "lambda:ListTags", "eks:ListClusters", "eks:DescribeCluster", "ec2:DescribeVpcEndpointServices", "ec2:DescribeVpcs", "ec2:DescribeSecurityGroups", "ecs:ListClusters", "ecs:DescribeClusters" ], "Resource" : "*" }, { "Sid" : "GuardDutyCreateSLRPolicy", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "malware-protection.guardduty.amazonaws.com" } } }, { "Sid" : "GuardDutyCreateVpcEndpointPolicy", "Effect" : "Allow", "Action" : "ec2:CreateVpcEndpoint", "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" }, "StringLike" : { "ec2:VpceServiceName" : [ "com.amazonaws.*.guardduty-data", "com.amazonaws.*.guardduty-data-fips" ] } } }, { "Sid" : "GuardDutyModifyDeleteVpcEndpointPolicy", "Effect" : "Allow", "Action" : [ "ec2:ModifyVpcEndpoint", "ec2:DeleteVpcEndpoints" ], "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "Null" : { "aws:ResourceTag/GuardDutyManaged" : false } } }, { "Sid" : "GuardDutyCreateModifyVpcEndpointNetworkPolicy", "Effect" : "Allow", "Action" : [ "ec2:CreateVpcEndpoint", "ec2:ModifyVpcEndpoint" ], "Resource" : [ "arn:aws:ec2:*:*:vpc/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:subnet/*" ] }, { "Sid" : "GuardDutyCreateTagsDuringVpcEndpointCreationPolicy", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:vpc-endpoint/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateVpcEndpoint" }, "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutySecurityGroupManagementPolicy", "Effect" : "Allow", "Action" : [ "ec2:AuthorizeSecurityGroupIngress", "ec2:AuthorizeSecurityGroupEgress", "ec2:RevokeSecurityGroupIngress", "ec2:RevokeSecurityGroupEgress", "ec2:DeleteSecurityGroup" ], "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "Null" : { "aws:ResourceTag/GuardDutyManaged" : false } } }, { "Sid" : "GuardDutyCreateSecurityGroupPolicy", "Effect" : "Allow", "Action" : "ec2:CreateSecurityGroup", "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "StringLike" : { "aws:RequestTag/GuardDutyManaged" : "*" } } }, { "Sid" : "GuardDutyCreateSecurityGroupForVpcPolicy", "Effect" : "Allow", "Action" : "ec2:CreateSecurityGroup", "Resource" : "arn:aws:ec2:*:*:vpc/*" }, { "Sid" : "GuardDutyCreateTagsDuringSecurityGroupCreationPolicy", "Effect" : "Allow", "Action" : "ec2:CreateTags", "Resource" : "arn:aws:ec2:*:*:security-group/*", "Condition" : { "StringEquals" : { "ec2:CreateAction" : "CreateSecurityGroup" }, "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyCreateEksAddonPolicy", "Effect" : "Allow", "Action" : "eks:CreateAddon", "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyEksAddonManagementPolicy", "Effect" : "Allow", "Action" : [ "eks:DeleteAddon", "eks:UpdateAddon", "eks:DescribeAddon" ], "Resource" : "arn:aws:eks:*:*:addon/*/aws-guardduty-agent/*" }, { "Sid" : "GuardDutyEksClusterTagResourcePolicy", "Effect" : "Allow", "Action" : "eks:TagResource", "Resource" : "arn:aws:eks:*:*:cluster/*", "Condition" : { "ForAnyValue:StringEquals" : { "aws:TagKeys" : "GuardDutyManaged" } } }, { "Sid" : "GuardDutyEcsPutAccountSettingsDefaultPolicy", "Effect" : "Allow", "Action" : "ecs:PutAccountSettingDefault", "Resource" : "*", "Condition" : { "StringEquals" : { "ecs:account-setting" : [ "guardDutyActivate" ] } } }, { "Sid" : "SsmCreateDescribeUpdateDeleteStartAssociationPermission", "Effect" : "Allow", "Action" : [ "ssm:DescribeAssociation", "ssm:DeleteAssociation", "ssm:UpdateAssociation", "ssm:CreateAssociation", "ssm:StartAssociationsOnce" ], "Resource" : "arn:aws:ssm:*:*:association/*", "Condition" : { "StringEquals" : { "aws:ResourceTag/GuardDutyManaged" : "true" } } }, { "Sid" : "SsmAddTagsToResourcePermission", "Effect" : "Allow", "Action" : [ "ssm:AddTagsToResource" ], "Resource" : "arn:aws:ssm:*:*:association/*", "Condition" : { "ForAllValues:StringEquals" : { "aws:TagKeys" : [ "GuardDutyManaged" ] }, "StringEquals" : { "aws:ResourceTag/GuardDutyManaged" : "true" } } }, { "Sid" : "SsmCreateUpdateAssociationInstanceDocumentPermission", "Effect" : "Allow", "Action" : [ "ssm:CreateAssociation", "ssm:UpdateAssociation" ], "Resource" : "arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin" }, { "Sid" : "SsmSendCommandPermission", "Effect" : "Allow", "Action" : "ssm:SendCommand", "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ssm:*:*:document/AmazonGuardDuty-ConfigureRuntimeMonitoringSsmPlugin" ] }, { "Sid" : "SsmGetCommandStatus", "Effect" : "Allow", "Action" : "ssm:GetCommandInvocation", "Resource" : "*" } ] }