CloudTrailEventContext - AWS 托管策略

本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。

CloudTrailEventContext

描述:此服务关联角色 CloudTrail 允许获取资源标签并将其添加到资源所有者的 CloudTrail 事件中。

CloudTrailEventContext 是一项 AWS 托管式策略

使用此策略

此附加到服务相关角色的策略允许服务代表您执行操作。您无法将此策略附加到您的用户、组或角色。

策略详细信息

  • 类型:服务相关角色策略

  • 创建时间:世界标准时间 2025 年 5 月 15 日 13:52

  • 编辑时间:世界标准时间 2025 年 5 月 15 日 13:52

  • ARN: arn:aws:iam::aws:policy/aws-service-role/CloudTrailEventContext

策略版本

策略版本:v1(默认)

此策略的默认版本是定义策略权限的版本。当使用该策略的用户或角色请求访问 AWS 资源时, AWS 会检查策略的默认版本以确定是否允许该请求。

JSON 策略文档

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "CloudTrailEventContextPermissionForTag", "Effect" : "Allow", "Action" : "tag:GetResources", "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "AllowEventBridgeRuleCreation", "Effect" : "Allow", "Action" : "events:PutRule", "Resource" : "arn:aws:events:*:*:rule/CloudTrailEventContext*", "Condition" : { "ForAllValues:StringEquals" : { "events:source" : "aws.tag" }, "StringEquals" : { "events:creatorAccount" : "${aws:PrincipalAccount}", "events:detail-type" : "Tag Change on Resource", "events:ManagedBy" : "context.cloudtrail.amazonaws.com" } } }, { "Sid" : "AllowEventBridgeRuleWrite", "Effect" : "Allow", "Action" : [ "events:PutTargets", "events:DeleteRule", "events:RemoveTargets" ], "Resource" : "arn:aws:events:*:*:rule/CloudTrailEventContext*", "Condition" : { "StringEquals" : { "events:creatorAccount" : "${aws:PrincipalAccount}", "events:ManagedBy" : "context.cloudtrail.amazonaws.com" } } }, { "Sid" : "AllowEventBridgeRuleRead", "Effect" : "Allow", "Action" : [ "events:DescribeRule", "events:ListTargetsByRule" ], "Condition" : { "StringEquals" : { "events:creatorAccount" : "${aws:PrincipalAccount}" } }, "Resource" : "arn:aws:events:*:*:rule/CloudTrailEventContext*" }, { "Sid" : "AllowEventBridgeRuleList", "Effect" : "Allow", "Action" : [ "events:ListRules" ], "Resource" : "*" } ] }

了解更多信息