BedrockAgentCoreFullAccess - AWS 受管政策

本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。

BedrockAgentCoreFullAccess

描述:提供 Bedrock AgentCore 的完整存取權,以及對相關服務的有限存取權

BedrockAgentCoreFullAccessAWS 受管政策

使用此政策

您可以將 BedrockAgentCoreFullAccess 連接至使用者、群組與角色。

政策詳細資訊

  • 類型: AWS 受管政策

  • 建立時間:2025 年 7 月 16 日 13:37 UTC

  • 編輯時間:2025 年 11 月 3 日 21:04 UTC

  • ARN: arn:aws:iam::aws:policy/BedrockAgentCoreFullAccess

政策版本

政策版本: v4 (預設)

政策的預設版本是定義政策許可的版本。當具有 政策的使用者或角色提出存取 AWS 資源的請求時, 會 AWS 檢查政策的預設版本,以決定是否允許請求。

JSON 政策文件

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "BedrockAgentCoreFullAccess", "Effect" : "Allow", "Action" : [ "bedrock-agentcore:*" ], "Resource" : "arn:aws:bedrock-agentcore:*:*:*" }, { "Sid" : "IAMListAccess", "Effect" : "Allow", "Action" : [ "iam:GetRole", "iam:GetRolePolicy", "iam:ListAttachedRolePolicies", "iam:ListRolePolicies", "iam:ListRoles" ], "Resource" : "arn:aws:iam::*:role/*" }, { "Sid" : "BedrockAgentCorePassRoleAccess", "Effect" : "Allow", "Action" : "iam:PassRole", "Resource" : "arn:aws:iam::*:role/*BedrockAgentCore*", "Condition" : { "StringEquals" : { "iam:PassedToService" : "bedrock-agentcore.amazonaws.com" } } }, { "Sid" : "SecretsManagerAccess", "Effect" : "Allow", "Action" : [ "secretsmanager:CreateSecret", "secretsmanager:PutSecretValue", "secretsmanager:GetSecretValue", "secretsmanager:DeleteSecret" ], "Resource" : "arn:aws:secretsmanager:*:*:secret:bedrock-agentcore*" }, { "Sid" : "BedrockAgentCoreKMSReadAccess", "Effect" : "Allow", "Action" : [ "kms:ListKeys", "kms:DescribeKey" ], "Resource" : [ "arn:aws:kms:*:*:key/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "BedrockAgentCoreKMSAccess", "Effect" : "Allow", "Action" : [ "kms:Decrypt", "kms:GenerateDataKey", "kms:ListGrants" ], "Resource" : [ "arn:aws:kms:*:*:key/*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" }, "ForAnyValue:StringEquals" : { "aws:CalledVia" : [ "bedrock-agentcore.amazonaws.com" ] } } }, { "Sid" : "BedrockAgentCoreKMSGrantsAccess", "Effect" : "Allow", "Action" : [ "kms:CreateGrant" ], "Resource" : [ "arn:aws:kms:*:*:key/*" ], "Condition" : { "StringEquals" : { "kms:GrantConstraintType" : "EncryptionContextSubset" }, "StringLike" : { "kms:ViaService" : [ "bedrock-agentcore.*.amazonaws.com" ], "kms:EncryptionContext:aws:bedrock-agentcore-gateway:arn" : "arn:aws:bedrock-agentcore:*:*:gateway/*" }, "ForAllValues:StringEquals" : { "kms:GrantOperations" : [ "Decrypt", "GenerateDataKey" ] } } }, { "Sid" : "BedrockAgentCoreS3Access", "Effect" : "Allow", "Action" : [ "s3:GetObject" ], "Resource" : [ "arn:aws:s3:::bedrock-agentcore-gateway-*" ], "Condition" : { "StringEquals" : { "aws:CalledViaLast" : "bedrock-agentcore.amazonaws.com", "s3:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "BedrockAgentCoreGatewayLambdaAccess", "Effect" : "Allow", "Action" : [ "lambda:ListFunctions" ], "Resource" : [ "arn:aws:lambda:*:*:*" ] }, { "Sid" : "LoggingAccess", "Effect" : "Allow", "Action" : [ "logs:Get*", "logs:List*", "logs:StartQuery", "logs:StopQuery", "logs:Describe*", "logs:TestMetricFilter", "logs:FilterLogEvents" ], "Resource" : [ "arn:aws:logs:*:*:log-group:/aws/bedrock-agentcore/*", "arn:aws:logs:*:*:log-group:/aws/application-signals/data:*", "arn:aws:logs:*:*:log-group:aws/spans:*" ] }, { "Sid" : "ObservabilityReadOnlyPermissions", "Effect" : "Allow", "Action" : [ "application-autoscaling:DescribeScalingPolicies", "application-signals:BatchGet*", "application-signals:Get*", "application-signals:List*", "autoscaling:Describe*", "cloudwatch:BatchGet*", "cloudwatch:Describe*", "cloudwatch:GenerateQuery", "cloudwatch:Get*", "cloudwatch:List*", "oam:ListSinks", "rum:BatchGet*", "rum:Get*", "rum:List*", "synthetics:Describe*", "synthetics:Get*", "synthetics:List*", "xray:BatchGet*", "xray:Get*", "xray:List*", "xray:StartTraceRetrieval", "xray:CancelTraceRetrieval", "logs:DescribeLogGroups", "logs:StartLiveTail", "logs:StopLiveTail" ], "Resource" : "*" }, { "Sid" : "TransactionSearchXRayPermissions", "Effect" : "Allow", "Action" : [ "xray:GetTraceSegmentDestination", "xray:UpdateTraceSegmentDestination", "xray:GetIndexingRules", "xray:UpdateIndexingRule" ], "Resource" : "*" }, { "Sid" : "TransactionSearchLogGroupPermissions", "Effect" : "Allow", "Action" : [ "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutRetentionPolicy" ], "Resource" : [ "arn:aws:logs:*:*:log-group:/aws/application-signals/data:*", "arn:aws:logs:*:*:log-group:aws/spans:*" ] }, { "Sid" : "TransactionSearchLogsPermissions", "Effect" : "Allow", "Action" : [ "logs:DescribeResourcePolicies", "logs:PutResourcePolicy" ], "Resource" : [ "*" ], "Condition" : { "StringEquals" : { "aws:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "TransactionSearchApplicationSignalsPermissions", "Effect" : "Allow", "Action" : [ "application-signals:StartDiscovery" ], "Resource" : "*" }, { "Sid" : "CloudWatchApplicationSignalsCreateServiceLinkedRolePermissions", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "arn:aws:iam::*:role/aws-service-role/application-signals.cloudwatch.amazonaws.com/AWSServiceRoleForCloudWatchApplicationSignals", "Condition" : { "StringLike" : { "iam:AWSServiceName" : "application-signals.cloudwatch.amazonaws.com" } } }, { "Sid" : "CloudWatchApplicationSignalsGetRolePermissions", "Effect" : "Allow", "Action" : "iam:GetRole", "Resource" : "arn:aws:iam::*:role/aws-service-role/application-signals.cloudwatch.amazonaws.com/AWSServiceRoleForCloudWatchApplicationSignals" }, { "Sid" : "CreateBedrockAgentCoreNetworkServiceLinkedRolePermissions", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "arn:aws:iam::*:role/aws-service-role/network.bedrock-agentcore.amazonaws.com/AWSServiceRoleForBedrockAgentCoreNetwork", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "network.bedrock-agentcore.amazonaws.com" } } }, { "Sid" : "CreateBedrockAgentCoreRuntimeIdentityServiceLinkedRolePermissions", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "arn:aws:iam::*:role/aws-service-role/runtime-identity.bedrock-agentcore.amazonaws.com/AWSServiceRoleForBedrockAgentCoreRuntimeIdentity", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : "runtime-identity.bedrock-agentcore.amazonaws.com" } } }, { "Sid" : "CloudWatchApplicationSignalsCloudTrailPermissions", "Effect" : "Allow", "Action" : [ "cloudtrail:CreateServiceLinkedChannel" ], "Resource" : "arn:aws:cloudtrail:*:*:channel/aws-service-channel/application-signals/*" }, { "Sid" : "BedrockAgentCoreRuntimeS3WriteAccess", "Effect" : "Allow", "Action" : [ "s3:CreateBucket", "s3:PutBucketPolicy", "s3:PutBucketVersioning", "s3:PutObject" ], "Resource" : [ "arn:aws:s3:::bedrock-agentcore-runtime-*" ], "Condition" : { "StringEquals" : { "s3:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "BedrockAgentCoreRuntimeS3ReadAccess", "Effect" : "Allow", "Action" : [ "s3:GetObject", "s3:GetObjectVersion", "s3:ListBucket", "s3:ListBucketVersions" ], "Resource" : "arn:aws:s3:::*", "Condition" : { "StringEquals" : { "s3:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "BedrockAgentCoreRuntimeS3ListAccess", "Effect" : "Allow", "Action" : [ "s3:ListAllMyBuckets" ], "Resource" : "*", "Condition" : { "StringEquals" : { "s3:ResourceAccount" : "${aws:PrincipalAccount}" } } }, { "Sid" : "BedrockAgentCoreRuntimeECRAccess", "Effect" : "Allow", "Action" : [ "ecr:DescribeRepositories", "ecr:DescribeImages", "ecr:ListImages" ], "Resource" : [ "arn:aws:ecr:*:*:repository/*" ] } ] }

進一步了解