本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonRedshiftFullAccess
描述:通过提供对亚马逊 Redshift 的完全访问权限。 AWS Management Console
AmazonRedshiftFullAccess
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonRedshiftFullAccess
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2015 年 2 月 6 日 18:40 UTC
-
编辑时间:2022 年 7 月 7 日 23:31 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonRedshiftFullAccess
策略版本
策略版本:v5 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Action" : [ "redshift:*", "redshift-serverless:*", "ec2:DescribeAccountAttributes", "ec2:DescribeAddresses", "ec2:DescribeAvailabilityZones", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcs", "ec2:DescribeInternetGateways", "sns:CreateTopic", "sns:Get*", "sns:List*", "cloudwatch:Describe*", "cloudwatch:Get*", "cloudwatch:List*", "cloudwatch:PutMetricAlarm", "cloudwatch:EnableAlarmActions", "cloudwatch:DisableAlarmActions", "tag:GetResources", "tag:UntagResources", "tag:GetTagValues", "tag:GetTagKeys", "tag:TagResources" ], "Effect" : "Allow", "Resource" : "*" }, { "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "arn:aws:iam::*:role/aws-service-role/redshift.amazonaws.com/AWSServiceRoleForRedshift", "Condition" : { "StringLike" : { "iam:AWSServiceName" : "redshift.amazonaws.com" } } }, { "Sid" : "DataAPIPermissions", "Action" : [ "redshift-data:ExecuteStatement", "redshift-data:CancelStatement", "redshift-data:ListStatements", "redshift-data:GetStatementResult", "redshift-data:DescribeStatement", "redshift-data:ListDatabases", "redshift-data:ListSchemas", "redshift-data:ListTables", "redshift-data:DescribeTable" ], "Effect" : "Allow", "Resource" : "*" }, { "Sid" : "SecretsManagerListPermissions", "Action" : [ "secretsmanager:ListSecrets" ], "Effect" : "Allow", "Resource" : "*" }, { "Sid" : "SecretsManagerCreateGetPermissions", "Action" : [ "secretsmanager:CreateSecret", "secretsmanager:GetSecretValue", "secretsmanager:TagResource" ], "Effect" : "Allow", "Resource" : "*", "Condition" : { "StringLike" : { "secretsmanager:ResourceTag/RedshiftDataFullAccess" : "*" } } } ] }