本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。
AmazonSecurityLakePermissionsBoundary
描述:Amazon Security Lake 为第三方自定义源创建 IAM 角色以向数据湖写入数据,为第三方订阅用户使用来自数据湖的数据创建 IAM 角色,并在创建这些角色时使用此策略来定义其权限边界。
AmazonSecurityLakePermissionsBoundary
是一项 AWS 托管式策略。
使用此策略
您可以将 AmazonSecurityLakePermissionsBoundary
附加到您的用户、组和角色。
策略详细信息
-
类型: AWS 托管策略
-
创建时间:2022 年 11 月 29 日 14:11 UTC
-
编辑时间:2024 年 5 月 14 日 20:39 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonSecurityLakePermissionsBoundary
策略版本
策略版本:v2 (默认值)
此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。
JSON 策略文档
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "AllowActionsForSecurityLake", "Effect" : "Allow", "Action" : [ "s3:GetObject", "s3:GetObjectVersion", "s3:ListBucket", "s3:ListBucketVersions", "s3:PutObject", "s3:GetBucketLocation", "kms:Decrypt", "kms:GenerateDataKey", "sqs:ReceiveMessage", "sqs:ChangeMessageVisibility", "sqs:DeleteMessage", "sqs:GetQueueUrl", "sqs:SendMessage", "sqs:GetQueueAttributes", "sqs:ListQueues" ], "Resource" : "*" }, { "Sid" : "DenyActionsForSecurityLake", "Effect" : "Deny", "NotAction" : [ "s3:GetObject", "s3:GetObjectVersion", "s3:ListBucket", "s3:ListBucketVersions", "s3:PutObject", "s3:GetBucketLocation", "kms:Decrypt", "kms:GenerateDataKey", "sqs:ReceiveMessage", "sqs:ChangeMessageVisibility", "sqs:DeleteMessage", "sqs:GetQueueUrl", "sqs:SendMessage", "sqs:GetQueueAttributes", "sqs:ListQueues" ], "Resource" : "*" }, { "Sid" : "DenyActionsNotOnSecurityLakeBucket", "Effect" : "Deny", "Action" : [ "s3:GetObject", "s3:GetObjectVersion", "s3:ListBucket", "s3:ListBucketVersions", "s3:PutObject", "s3:GetBucketLocation" ], "NotResource" : [ "arn:aws:s3:::aws-security-data-lake*" ] }, { "Sid" : "DenyActionsNotOnSecurityLakeSQS", "Effect" : "Deny", "Action" : [ "sqs:ReceiveMessage", "sqs:ChangeMessageVisibility", "sqs:DeleteMessage", "sqs:GetQueueUrl", "sqs:SendMessage", "sqs:GetQueueAttributes", "sqs:ListQueues" ], "NotResource" : "arn:aws:sqs:*:*:AmazonSecurityLake*" }, { "Sid" : "DenyActionsNotOnSecurityLakeKMSS3SQS", "Effect" : "Deny", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource" : "*", "Condition" : { "StringNotLike" : { "kms:ViaService" : [ "s3.*.amazonaws.com", "sqs.*.amazonaws.com" ] } } }, { "Sid" : "DenyActionsNotOnSecurityLakeKMSForS3", "Effect" : "Deny", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource" : "*", "Condition" : { "Null" : { "kms:EncryptionContext:aws:s3:arn" : "false" }, "StringNotLikeIfExists" : { "kms:EncryptionContext:aws:s3:arn" : [ "arn:aws:s3:::aws-security-data-lake*" ] } } }, { "Sid" : "DenyActionsNotOnSecurityLakeKMSForS3SQS", "Effect" : "Deny", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource" : "*", "Condition" : { "Null" : { "kms:EncryptionContext:aws:sqs:arn" : "false" }, "StringNotLikeIfExists" : { "kms:EncryptionContext:aws:sqs:arn" : [ "arn:aws:sqs:*:*:AmazonSecurityLake*" ] } } } ] }