Service-linked role permissions for WorkSpaces Secure Browser
WorkSpaces Secure Browser uses the service-linked role named AWSServiceRoleForAmazonWorkSpacesWeb –
WorkSpaces Secure Browser uses this service-linked role to access Amazon EC2 resources of customer accounts for streaming instances and CloudWatch metrics.
The AWSServiceRoleForAmazonWorkSpacesWeb service-linked role trusts the following services to assume the
role:
-
workspaces-web.amazonaws.com
The role permissions policy named AmazonWorkSpacesWebServiceRolePolicy allows WorkSpaces Secure Browser to
complete the following actions on the specified
resources. For more
information, see AWS managed
policy: AmazonWorkSpacesWebServiceRolePolicy.
-
Action:
ec2:DescribeVpcsonall AWS resources -
Action:
ec2:DescribeSubnetsonall AWS resources -
Action:
ec2:DescribeAvailabilityZonesonall AWS resources -
Action:
ec2:CreateNetworkInterfacewithaws:RequestTag/WorkSpacesWebManaged: trueon subnet and security group resources -
Action:
ec2:DescribeNetworkInterfacesonall AWS resources -
Action:
ec2:DeleteNetworkInterfaceon network interfaces withaws:ResourceTag/WorkSpacesWebManaged: true -
Action:
ec2:DescribeSubnetsonall AWS resources -
Action:
ec2:AssociateAddressonall AWS resources -
Action:
ec2:DisassociateAddressonall AWS resources -
Action:
ec2:DescribeRouteTablesonall AWS resources -
Action:
ec2:DescribeSecurityGroupsonall AWS resources -
Action:
ec2:DescribeVpcEndpointsonall AWS resources -
Action:
ec2:CreateTagsonec2:CreateNetworkInterfaceOperation withaws:TagKeys: ["WorkSpacesWebManaged"] -
Action:
cloudwatch:PutMetricDataonall AWS resources -
Action:
kinesis:PutRecordon Kinesis data streams with names that start withamazon-workspaces-web- -
Action:
kinesis:PutRecordson Kinesis data streams with names that start withamazon-workspaces-web- -
Action:
kinesis:DescribeStreamSummaryon Kinesis data streams with names that start withamazon-workspaces-web-
You must configure permissions to allow an IAM entity (such as a user, group, or role) to create, edit, or delete a service-linked role. For more information, see Service-Linked Role Permissions in the IAM User Guide.