本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonECSInfrastructureRolePolicyForManagedInstances
描述:提供 ECS 访问权限以创建和管理 EC2 托管资源
AmazonECSInfrastructureRolePolicyForManagedInstances 是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonECSInfrastructureRolePolicyForManagedInstances 附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2025 年 9 月 26 日 18:04 UTC
-
编辑时间:2025 年 9 月 29 日 21:04 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonECSInfrastructureRolePolicyForManagedInstances
策略版本
策略版本:v2(默认)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "CreateLaunchTemplateForManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:CreateLaunchTemplate" ], "Resource" : [ "arn:aws:ec2:*:*:launch-template/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/AmazonECSManaged" : "true" } } }, { "Sid" : "CreateLaunchTemplateVersionsForManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:CreateLaunchTemplateVersion", "ec2:ModifyLaunchTemplate" ], "Resource" : [ "arn:aws:ec2:*:*:launch-template/*" ], "Condition" : { "StringEquals" : { "ec2:ManagedResourceOperator" : "ecs.amazonaws.com" } } }, { "Sid" : "ProvisionEC2InstancesForManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:CreateFleet" ], "Resource" : [ "arn:aws:ec2:*:*:fleet/*", "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:launch-template/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:volume/*", "arn:aws:ec2:*:*:image/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/AmazonECSManaged" : "true" } } }, { "Sid" : "RunInstancesForManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Resource" : [ "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*", "arn:aws:ec2:*:*:network-interface/*" ], "Condition" : { "StringEquals" : { "aws:RequestTag/AmazonECSManaged" : "true" } } }, { "Sid" : "RunInstancesForECSManagedLaunchTemplates", "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Resource" : [ "arn:aws:ec2:*:*:launch-template/*" ], "Condition" : { "StringEquals" : { "ec2:ResourceTag/AmazonECSManaged" : "true" } } }, { "Sid" : "RunInstancesForSupportingResources", "Effect" : "Allow", "Action" : [ "ec2:RunInstances" ], "Resource" : [ "arn:aws:ec2:*:*:subnet/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*::image/*" ] }, { "Sid" : "TagOnCreateEC2ResourcesForManagedInstances", "Effect" : "Allow", "Action" : [ "ec2:CreateTags" ], "Resource" : [ "arn:aws:ec2:*:*:fleet/*", "arn:aws:ec2:*:*:launch-template/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:instance/*", "arn:aws:ec2:*:*:volume/*" ], "Condition" : { "StringEquals" : { "ec2:CreateAction" : [ "CreateFleet", "CreateLaunchTemplate", "RunInstances" ] } } }, { "Sid" : "PassInstanceRoleForManagedInstances", "Effect" : "Allow", "Action" : [ "iam:PassRole" ], "Resource" : [ "arn:aws:iam::*:role/ecsInstanceRole*" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : "ec2.amazonaws.com" } } }, { "Sid" : "CreateServiceLinkedRoleForEC2Spot", "Effect" : "Allow", "Action" : [ "iam:CreateServiceLinkedRole" ], "Resource" : [ "arn:aws:iam::*:role/aws-service-role/spot.amazonaws.com/AWSServiceRoleForEC2Spot" ] }, { "Sid" : "DescribeEC2ResourcesManagedByECS", "Effect" : "Allow", "Action" : [ "ec2:DescribeInstances", "ec2:DescribeInstanceTypes", "ec2:DescribeLaunchTemplates", "ec2:DescribeNetworkInterfaces", "ec2:DescribeInstanceTypeOfferings", "ec2:DescribeAvailabilityZones", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcs" ], "Resource" : "*" } ] }