-
Notifications
You must be signed in to change notification settings - Fork 23
/
Copy pathAWS-SSM-DiagnosisAutomation-AdministrationRolePolicy.json
113 lines (113 loc) · 3.32 KB
/
AWS-SSM-DiagnosisAutomation-AdministrationRolePolicy.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
{
"Arn": "arn:aws:iam::aws:policy/AWS-SSM-DiagnosisAutomation-AdministrationRolePolicy",
"CreateDate": "2024-11-16T00:01:45Z",
"DefaultVersionId": "v1",
"IsAttachable": true,
"Path": "/",
"PolicyId": "ANPAZKAPJZG4APUPTIENG",
"PolicyName": "AWS-SSM-DiagnosisAutomation-AdministrationRolePolicy",
"PolicyVersion": {
"CreateDate": "2024-11-16T00:01:45Z",
"Document": {
"Statement": [
{
"Action": "iam:PassRole",
"Condition": {
"StringEquals": {
"iam:PassedToService": "ssm.amazonaws.com"
}
},
"Effect": "Allow",
"Resource": "arn:aws:iam::*:role/AWS-SSM-DiagnosisAdminRole*",
"Sid": "AllowPassRoleOnSelfToSsm"
},
{
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"aws:ResourceAccount": "${aws:PrincipalAccount}"
}
},
"Effect": "Allow",
"Resource": "arn:aws:iam::*:role/AWS-SSM-DiagnosisExecutionRole*",
"Sid": "AllowAssumeDiagnosisExecutionRoleWithinAccount"
},
{
"Action": [
"kms:Decrypt",
"kms:GenerateDataKey"
],
"Condition": {
"ArnLike": {
"kms:EncryptionContext:aws:s3:arn": "arn:aws:s3:::do-not-delete-ssm-diagnosis-*"
},
"Bool": {
"aws:ViaAWSService": "true"
},
"StringEquals": {
"aws:ResourceTag/SystemsManagerManaged": "true"
},
"StringLike": {
"kms:ViaService": "s3.*.amazonaws.com"
}
},
"Effect": "Allow",
"Resource": "arn:aws:kms:*:*:key/*",
"Sid": "AllowKMSOperations"
},
{
"Action": [
"s3:DeleteObject",
"s3:GetObject",
"s3:PutObject"
],
"Condition": {
"StringEquals": {
"aws:ResourceAccount": "${aws:PrincipalAccount}"
}
},
"Effect": "Allow",
"Resource": "arn:aws:s3:::do-not-delete-ssm-diagnosis-*/actions/*",
"Sid": "AllowReadWriteToSsmDiagnosisBucketInSameAccount"
},
{
"Action": [
"s3:ListBucket"
],
"Condition": {
"StringEquals": {
"aws:ResourceAccount": "${aws:PrincipalAccount}"
}
},
"Effect": "Allow",
"Resource": "arn:aws:s3:::do-not-delete-ssm-diagnosis-*",
"Sid": "AllowListBucketOnSsmDiagnosisBucketInSameAccount"
},
{
"Action": [
"ssm:DescribeAutomationExecutions",
"ssm:DescribeAutomationStepExecutions",
"ssm:GetAutomationExecution"
],
"Effect": "Allow",
"Resource": "*",
"Sid": "AllowReadOnlyAccessSSMResource"
},
{
"Action": [
"ssm:StartAutomationExecution"
],
"Effect": "Allow",
"Resource": [
"arn:aws:ssm:*:*:automation-definition/AWS-*UnmanagedEC2*:*"
],
"Sid": "AllowExecuteSSMAutomation"
}
],
"Version": "2012-10-17"
},
"IsDefaultVersion": true,
"VersionId": "v1"
},
"UpdateDate": "2024-11-16T00:01:45Z"
}