本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AWSTransformApplicationDeploymentPolicy
描述:允许 AWS 转换服务通过创建和管理 AWS 资源来部署转换后的.NET 应用程序。此策略授予跨各种 AWS 服务配置基础架构、管理计算资源和配置部署设置的权限。
AWSTransformApplicationDeploymentPolicy
是一项 AWS 托管式策略。
使用此策略
您可以将 AWSTransformApplicationDeploymentPolicy
附加到您的用户、组和角色。
策略详细信息
-
类型:服务角色策略
-
创建时间:世界标准时间 2025 年 8 月 28 日 06:34
-
编辑时间:世界标准时间 2025 年 9 月 29 日 22:19
-
ARN:
arn:aws:iam::aws:policy/service-role/AWSTransformApplicationDeploymentPolicy
策略版本
策略版本:v2(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Effect" : "Allow", "Action" : [ "cloudformation:DescribeStacks", "cloudformation:DescribeStackEvents" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : [ "arn:aws:cloudformation:*:*:stack/AWSTransform*" ] }, { "Effect" : "Allow", "Action" : [ "cloudformation:CreateStack" ], "Condition" : { "StringEquals" : { "aws:RequestTag/CreatedBy" : "AWSTransform", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : "arn:aws:cloudformation:*:*:stack/AWSTransform*" }, { "Effect" : "Allow", "Action" : [ "cloudformation:DeleteStack" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "AWSTransform", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : "arn:aws:cloudformation:*:*:stack/AWSTransform*" }, { "Effect" : "Allow", "Action" : [ "cloudformation:UpdateStack" ], "Condition" : { "StringEquals" : { "aws:RequestTag/CreatedBy" : "AWSTransform", "aws:ResourceTag/CreatedBy" : "AWSTransform", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : "arn:aws:cloudformation:*:*:stack/AWSTransform*" }, { "Effect" : "Allow", "Action" : [ "ec2:DescribeVpcs", "ec2:DescribeSubnets", "ec2:DescribeSecurityGroups", "ec2:DescribeImages", "ec2:DescribeInstances" ], "Resource" : "*" }, { "Effect" : "Deny", "Action" : [ "ec2:CreateTags", "ec2:DeleteTags" ], "Resource" : "arn:aws:ec2:*:*:instance/*", "Condition" : { "ForAnyValue:StringNotEquals" : { "aws:TagKeys" : [ "Name", "CreatedBy", "ApplicationName", "TransformationType", "aws:cloudformation:stack-name", "aws:cloudformation:logical-id", "aws:cloudformation:stack-id" ] } } }, { "Effect" : "Allow", "Action" : [ "ec2:CreateTags", "ec2:DeleteTags" ], "Condition" : { "ForAnyValue:StringEquals" : { "aws:CalledVia" : "cloudformation.amazonaws.com" }, "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Condition" : { "ForAnyValue:StringEquals" : { "aws:CalledVia" : "cloudformation.amazonaws.com" } }, "Resource" : [ "arn:aws:ec2:*::image/*" ] }, { "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Condition" : { "ForAnyValue:StringEquals" : { "aws:CalledVia" : "cloudformation.amazonaws.com" }, "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*" ] }, { "Effect" : "Allow", "Action" : [ "iam:GetRole", "iam:GetInstanceProfile" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : [ "arn:aws:iam::*:role/AWSTransform-Deploy-Builder-Instance-Role", "arn:aws:iam::*:instance-profile/AWSTransform-Deploy-Builder-Instance-Role", "arn:aws:iam::*:role/AWSTransform-Deploy-App-Instance-Role", "arn:aws:iam::*:instance-profile/AWSTransform-Deploy-App-Instance-Role" ] }, { "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : "ec2.amazonaws.com", "aws:ResourceAccount" : "${aws:PrincipalAccount}" } }, "Resource" : [ "arn:aws:iam::*:role/AWSTransform-Deploy-Builder-Instance-Role", "arn:aws:iam::*:role/AWSTransform-Deploy-App-Instance-Role" ] }, { "Effect" : "Allow", "Action" : [ "ssm:GetParameters" ], "Resource" : "arn:aws:ssm:*::parameter/aws/service/ami-amazon-linux-latest*" }, { "Effect" : "Allow", "Action" : [ "ec2:TerminateInstances", "ec2:StopInstances", "ec2:StartInstances", "ec2:ModifyInstanceAttribute" ], "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "AWSTransform", "aws:ResourceAccount" : "${aws:PrincipalAccount}" }, "ForAnyValue:StringEquals" : { "aws:CalledVia" : "cloudformation.amazonaws.com" } }, "Resource" : "arn:aws:ec2:*:*:instance/*" }, { "Effect" : "Allow", "Action" : [ "ssm:SendCommand" ], "Resource" : [ "arn:aws:ssm:*:*:document/AWS-RunRemoteScript" ] }, { "Effect" : "Allow", "Action" : [ "ssm:SendCommand" ], "Resource" : "arn:aws:ec2:*:*:instance/*", "Condition" : { "StringEquals" : { "aws:ResourceTag/CreatedBy" : "AWSTransform" } } }, { "Effect" : "Allow", "Action" : [ "ssm:DescribeInstanceInformation", "ssm:GetCommandInvocation" ], "Resource" : [ "arn:aws:ssm:*:*:*", "arn:aws:ec2:*:*:instance/*" ] }, { "Effect" : "Allow", "Action" : [ "s3:PutObject", "s3:ListMultipartUploadParts", "s3:ListBucketMultipartUploads", "s3:AbortMultipartUpload", "s3:PutBucketTagging" ], "Resource" : [ "arn:aws:s3:::aws-transform-deployment-bucket-*", "arn:aws:s3:::aws-transform-deployment-bucket-*/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } } ] }