@cloud-copilot/iam-data 0.9.202411261 → 0.9.202412071
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/data/actions/aiops.json +384 -0
- package/data/actions/aoss.json +1 -0
- package/data/actions/bedrock.json +576 -2
- package/data/actions/chime.json +95 -1
- package/data/actions/cleanrooms.json +1 -0
- package/data/actions/config.json +146 -14
- package/data/actions/connect-campaigns.json +15 -0
- package/data/actions/connect.json +40 -1
- package/data/actions/datazone.json +0 -5
- package/data/actions/dsql.json +191 -0
- package/data/actions/eks.json +8 -2
- package/data/actions/es.json +99 -3
- package/data/actions/glue.json +75 -0
- package/data/actions/imagebuilder.json +15 -0
- package/data/actions/invoicing.json +136 -0
- package/data/actions/logs.json +32 -0
- package/data/actions/memorydb.json +162 -0
- package/data/actions/networkflowmonitor.json +393 -0
- package/data/actions/observabilityadmin.json +66 -0
- package/data/actions/opensearch.json +60 -0
- package/data/actions/partnercentral.json +256 -0
- package/data/actions/qapps.json +0 -4
- package/data/actions/qbusiness.json +377 -0
- package/data/actions/quicksight.json +79 -0
- package/data/actions/redshift-serverless.json +8 -0
- package/data/actions/redshift.json +16 -0
- package/data/actions/rekognition.json +58 -11
- package/data/actions/s3.json +71 -0
- package/data/actions/s3tables.json +461 -0
- package/data/actions/sagemaker-data-science-assistant.json +11 -0
- package/data/actions/sagemaker.json +371 -9
- package/data/actions/security-ir.json +344 -0
- package/data/actions/transfer.json +127 -0
- package/data/actions/vpc-lattice.json +423 -44
- package/data/actions/vpce.json +11 -0
- package/data/conditionKeys/aiops.json +17 -0
- package/data/conditionKeys/bedrock.json +5 -0
- package/data/conditionKeys/config.json +5 -0
- package/data/conditionKeys/dsql.json +22 -0
- package/data/conditionKeys/eks.json +15 -0
- package/data/conditionKeys/invoicing.json +17 -1
- package/data/conditionKeys/networkflowmonitor.json +17 -0
- package/data/conditionKeys/observabilityadmin.json +1 -0
- package/data/conditionKeys/s3express.json +5 -0
- package/data/conditionKeys/s3tables.json +12 -0
- package/data/conditionKeys/sagemaker-data-science-assistant.json +1 -0
- package/data/conditionKeys/security-ir.json +17 -0
- package/data/conditionKeys/vpc-lattice.json +10 -0
- package/data/conditionKeys/vpce.json +1 -0
- package/data/resourceTypes/aiops.json +9 -0
- package/data/resourceTypes/bedrock.json +27 -0
- package/data/resourceTypes/config.json +7 -0
- package/data/resourceTypes/dsql.json +9 -0
- package/data/resourceTypes/es.json +7 -0
- package/data/resourceTypes/invoicing.json +9 -1
- package/data/resourceTypes/memorydb.json +12 -0
- package/data/resourceTypes/networkflowmonitor.json +16 -0
- package/data/resourceTypes/observabilityadmin.json +1 -0
- package/data/resourceTypes/opensearch.json +4 -0
- package/data/resourceTypes/partnercentral.json +12 -0
- package/data/resourceTypes/personalize.json +3 -3
- package/data/resourceTypes/qbusiness.json +14 -0
- package/data/resourceTypes/rekognition.json +8 -2
- package/data/resourceTypes/s3tables.json +14 -0
- package/data/resourceTypes/sagemaker-data-science-assistant.json +1 -0
- package/data/resourceTypes/sagemaker.json +32 -0
- package/data/resourceTypes/security-ir.json +16 -0
- package/data/resourceTypes/transfer.json +7 -0
- package/data/resourceTypes/vpc-lattice.json +76 -35
- package/data/resourceTypes/vpce.json +1 -0
- package/data/serviceNames.json +8 -0
- package/data/services.json +8 -0
- package/package.json +2 -2
|
@@ -0,0 +1,384 @@
|
|
|
1
|
+
{
|
|
2
|
+
"createinvestigation": {
|
|
3
|
+
"name": "CreateInvestigation",
|
|
4
|
+
"description": "Grants permission to create a new investigation in the specified investigation group",
|
|
5
|
+
"accessLevel": "Write",
|
|
6
|
+
"resourceTypes": [
|
|
7
|
+
{
|
|
8
|
+
"name": "investigation-group",
|
|
9
|
+
"required": true,
|
|
10
|
+
"conditionKeys": [],
|
|
11
|
+
"dependentActions": []
|
|
12
|
+
}
|
|
13
|
+
],
|
|
14
|
+
"conditionKeys": [],
|
|
15
|
+
"dependentActions": [
|
|
16
|
+
"kms:Decrypt",
|
|
17
|
+
"kms:GenerateDataKey",
|
|
18
|
+
"sts:SetContext"
|
|
19
|
+
]
|
|
20
|
+
},
|
|
21
|
+
"createinvestigationevent": {
|
|
22
|
+
"name": "CreateInvestigationEvent",
|
|
23
|
+
"description": "Grants permission to create a new investigation event in the specified investigation group",
|
|
24
|
+
"accessLevel": "Write",
|
|
25
|
+
"resourceTypes": [
|
|
26
|
+
{
|
|
27
|
+
"name": "investigation-group",
|
|
28
|
+
"required": true,
|
|
29
|
+
"conditionKeys": [],
|
|
30
|
+
"dependentActions": []
|
|
31
|
+
}
|
|
32
|
+
],
|
|
33
|
+
"conditionKeys": [],
|
|
34
|
+
"dependentActions": [
|
|
35
|
+
"kms:Decrypt",
|
|
36
|
+
"kms:GenerateDataKey",
|
|
37
|
+
"sts:SetContext"
|
|
38
|
+
]
|
|
39
|
+
},
|
|
40
|
+
"createinvestigationgroup": {
|
|
41
|
+
"name": "CreateInvestigationGroup",
|
|
42
|
+
"description": "Grants permission to create a new investigation group",
|
|
43
|
+
"accessLevel": "Write",
|
|
44
|
+
"resourceTypes": [],
|
|
45
|
+
"conditionKeys": [
|
|
46
|
+
"aws:TagKeys",
|
|
47
|
+
"aws:RequestTag/${TagKey}"
|
|
48
|
+
],
|
|
49
|
+
"dependentActions": [
|
|
50
|
+
"aiops:TagResource",
|
|
51
|
+
"cloudtrail:DescribeTrails",
|
|
52
|
+
"iam:PassRole",
|
|
53
|
+
"kms:Decrypt",
|
|
54
|
+
"kms:DescribeKey",
|
|
55
|
+
"kms:GenerateDataKey",
|
|
56
|
+
"sso:CreateApplication",
|
|
57
|
+
"sso:DeleteApplication",
|
|
58
|
+
"sso:PutApplicationAccessScope",
|
|
59
|
+
"sso:PutApplicationAssignmentConfiguration",
|
|
60
|
+
"sso:PutApplicationAuthenticationMethod",
|
|
61
|
+
"sso:PutApplicationGrant",
|
|
62
|
+
"sso:TagResource"
|
|
63
|
+
]
|
|
64
|
+
},
|
|
65
|
+
"createinvestigationresource": {
|
|
66
|
+
"name": "CreateInvestigationResource",
|
|
67
|
+
"description": "Grants permission to create an investigation resource in the specified investigation group",
|
|
68
|
+
"accessLevel": "Write",
|
|
69
|
+
"resourceTypes": [
|
|
70
|
+
{
|
|
71
|
+
"name": "investigation-group",
|
|
72
|
+
"required": true,
|
|
73
|
+
"conditionKeys": [],
|
|
74
|
+
"dependentActions": []
|
|
75
|
+
}
|
|
76
|
+
],
|
|
77
|
+
"conditionKeys": [],
|
|
78
|
+
"dependentActions": [
|
|
79
|
+
"cloudwatch:DescribeAlarmHistory",
|
|
80
|
+
"cloudwatch:DescribeAlarms",
|
|
81
|
+
"cloudwatch:GetInsightRuleReport",
|
|
82
|
+
"cloudwatch:GetMetricData",
|
|
83
|
+
"kms:GenerateDataKey",
|
|
84
|
+
"logs:GetQueryResults"
|
|
85
|
+
]
|
|
86
|
+
},
|
|
87
|
+
"deleteinvestigation": {
|
|
88
|
+
"name": "DeleteInvestigation",
|
|
89
|
+
"description": "Grants permission to delete an investigation in the specified investigation group",
|
|
90
|
+
"accessLevel": "Write",
|
|
91
|
+
"resourceTypes": [
|
|
92
|
+
{
|
|
93
|
+
"name": "investigation-group",
|
|
94
|
+
"required": true,
|
|
95
|
+
"conditionKeys": [],
|
|
96
|
+
"dependentActions": []
|
|
97
|
+
}
|
|
98
|
+
],
|
|
99
|
+
"conditionKeys": [],
|
|
100
|
+
"dependentActions": [
|
|
101
|
+
"sts:SetContext"
|
|
102
|
+
]
|
|
103
|
+
},
|
|
104
|
+
"deleteinvestigationgroup": {
|
|
105
|
+
"name": "DeleteInvestigationGroup",
|
|
106
|
+
"description": "Grants permission to delete the specified investigation group",
|
|
107
|
+
"accessLevel": "Write",
|
|
108
|
+
"resourceTypes": [
|
|
109
|
+
{
|
|
110
|
+
"name": "investigation-group",
|
|
111
|
+
"required": true,
|
|
112
|
+
"conditionKeys": [],
|
|
113
|
+
"dependentActions": []
|
|
114
|
+
}
|
|
115
|
+
],
|
|
116
|
+
"conditionKeys": [],
|
|
117
|
+
"dependentActions": [
|
|
118
|
+
"sso:DeleteApplication"
|
|
119
|
+
]
|
|
120
|
+
},
|
|
121
|
+
"deleteinvestigationgrouppolicy": {
|
|
122
|
+
"name": "DeleteInvestigationGroupPolicy",
|
|
123
|
+
"description": "Grants permission to delete the investigation group policy attached to an investigation group",
|
|
124
|
+
"accessLevel": "Write",
|
|
125
|
+
"resourceTypes": [
|
|
126
|
+
{
|
|
127
|
+
"name": "investigation-group",
|
|
128
|
+
"required": true,
|
|
129
|
+
"conditionKeys": [],
|
|
130
|
+
"dependentActions": []
|
|
131
|
+
}
|
|
132
|
+
],
|
|
133
|
+
"conditionKeys": [],
|
|
134
|
+
"dependentActions": []
|
|
135
|
+
},
|
|
136
|
+
"getinvestigation": {
|
|
137
|
+
"name": "GetInvestigation",
|
|
138
|
+
"description": "Grants permission to retrieve an investigation in the specified investigation group",
|
|
139
|
+
"accessLevel": "Read",
|
|
140
|
+
"resourceTypes": [
|
|
141
|
+
{
|
|
142
|
+
"name": "investigation-group",
|
|
143
|
+
"required": true,
|
|
144
|
+
"conditionKeys": [],
|
|
145
|
+
"dependentActions": []
|
|
146
|
+
}
|
|
147
|
+
],
|
|
148
|
+
"conditionKeys": [],
|
|
149
|
+
"dependentActions": []
|
|
150
|
+
},
|
|
151
|
+
"getinvestigationevent": {
|
|
152
|
+
"name": "GetInvestigationEvent",
|
|
153
|
+
"description": "Grants permission to retrieve an investigation event in the specified investigation group",
|
|
154
|
+
"accessLevel": "Read",
|
|
155
|
+
"resourceTypes": [
|
|
156
|
+
{
|
|
157
|
+
"name": "investigation-group",
|
|
158
|
+
"required": true,
|
|
159
|
+
"conditionKeys": [],
|
|
160
|
+
"dependentActions": []
|
|
161
|
+
}
|
|
162
|
+
],
|
|
163
|
+
"conditionKeys": [],
|
|
164
|
+
"dependentActions": [
|
|
165
|
+
"kms:Decrypt"
|
|
166
|
+
]
|
|
167
|
+
},
|
|
168
|
+
"getinvestigationgroup": {
|
|
169
|
+
"name": "GetInvestigationGroup",
|
|
170
|
+
"description": "Grants permission to retrieve the specified investigation group",
|
|
171
|
+
"accessLevel": "Read",
|
|
172
|
+
"resourceTypes": [
|
|
173
|
+
{
|
|
174
|
+
"name": "investigation-group",
|
|
175
|
+
"required": true,
|
|
176
|
+
"conditionKeys": [],
|
|
177
|
+
"dependentActions": []
|
|
178
|
+
}
|
|
179
|
+
],
|
|
180
|
+
"conditionKeys": [],
|
|
181
|
+
"dependentActions": []
|
|
182
|
+
},
|
|
183
|
+
"getinvestigationgrouppolicy": {
|
|
184
|
+
"name": "GetInvestigationGroupPolicy",
|
|
185
|
+
"description": "Grants permission to retrieve the investigation group policy attached to an investigation group",
|
|
186
|
+
"accessLevel": "Read",
|
|
187
|
+
"resourceTypes": [
|
|
188
|
+
{
|
|
189
|
+
"name": "investigation-group",
|
|
190
|
+
"required": true,
|
|
191
|
+
"conditionKeys": [],
|
|
192
|
+
"dependentActions": []
|
|
193
|
+
}
|
|
194
|
+
],
|
|
195
|
+
"conditionKeys": [],
|
|
196
|
+
"dependentActions": []
|
|
197
|
+
},
|
|
198
|
+
"getinvestigationresource": {
|
|
199
|
+
"name": "GetInvestigationResource",
|
|
200
|
+
"description": "Grants permission to retrieve an investigation resource in the specified investigation group",
|
|
201
|
+
"accessLevel": "Read",
|
|
202
|
+
"resourceTypes": [
|
|
203
|
+
{
|
|
204
|
+
"name": "investigation-group",
|
|
205
|
+
"required": true,
|
|
206
|
+
"conditionKeys": [],
|
|
207
|
+
"dependentActions": []
|
|
208
|
+
}
|
|
209
|
+
],
|
|
210
|
+
"conditionKeys": [],
|
|
211
|
+
"dependentActions": [
|
|
212
|
+
"kms:Decrypt"
|
|
213
|
+
]
|
|
214
|
+
},
|
|
215
|
+
"listinvestigationevents": {
|
|
216
|
+
"name": "ListInvestigationEvents",
|
|
217
|
+
"description": "Grants permission to list all investigation events in the specified investigation group",
|
|
218
|
+
"accessLevel": "List",
|
|
219
|
+
"resourceTypes": [
|
|
220
|
+
{
|
|
221
|
+
"name": "investigation-group",
|
|
222
|
+
"required": true,
|
|
223
|
+
"conditionKeys": [],
|
|
224
|
+
"dependentActions": []
|
|
225
|
+
}
|
|
226
|
+
],
|
|
227
|
+
"conditionKeys": [],
|
|
228
|
+
"dependentActions": []
|
|
229
|
+
},
|
|
230
|
+
"listinvestigationgroups": {
|
|
231
|
+
"name": "ListInvestigationGroups",
|
|
232
|
+
"description": "Grants permission to list all investigation groups in the AWS account making the request",
|
|
233
|
+
"accessLevel": "List",
|
|
234
|
+
"resourceTypes": [],
|
|
235
|
+
"conditionKeys": [],
|
|
236
|
+
"dependentActions": []
|
|
237
|
+
},
|
|
238
|
+
"listinvestigations": {
|
|
239
|
+
"name": "ListInvestigations",
|
|
240
|
+
"description": "Grants permission to list all investigations that are in the specified investigation group",
|
|
241
|
+
"accessLevel": "List",
|
|
242
|
+
"resourceTypes": [
|
|
243
|
+
{
|
|
244
|
+
"name": "investigation-group",
|
|
245
|
+
"required": true,
|
|
246
|
+
"conditionKeys": [],
|
|
247
|
+
"dependentActions": []
|
|
248
|
+
}
|
|
249
|
+
],
|
|
250
|
+
"conditionKeys": [],
|
|
251
|
+
"dependentActions": []
|
|
252
|
+
},
|
|
253
|
+
"listtagsforresource": {
|
|
254
|
+
"name": "ListTagsForResource",
|
|
255
|
+
"description": "Grants permission to list the tags for the specified resource",
|
|
256
|
+
"accessLevel": "List",
|
|
257
|
+
"resourceTypes": [
|
|
258
|
+
{
|
|
259
|
+
"name": "investigation-group",
|
|
260
|
+
"required": true,
|
|
261
|
+
"conditionKeys": [],
|
|
262
|
+
"dependentActions": []
|
|
263
|
+
}
|
|
264
|
+
],
|
|
265
|
+
"conditionKeys": [],
|
|
266
|
+
"dependentActions": []
|
|
267
|
+
},
|
|
268
|
+
"putinvestigationgrouppolicy": {
|
|
269
|
+
"name": "PutInvestigationGroupPolicy",
|
|
270
|
+
"description": "Grants permission to create/update the investigation group policy attached to an investigation group",
|
|
271
|
+
"accessLevel": "Write",
|
|
272
|
+
"resourceTypes": [
|
|
273
|
+
{
|
|
274
|
+
"name": "investigation-group",
|
|
275
|
+
"required": true,
|
|
276
|
+
"conditionKeys": [],
|
|
277
|
+
"dependentActions": []
|
|
278
|
+
}
|
|
279
|
+
],
|
|
280
|
+
"conditionKeys": [],
|
|
281
|
+
"dependentActions": []
|
|
282
|
+
},
|
|
283
|
+
"tagresource": {
|
|
284
|
+
"name": "TagResource",
|
|
285
|
+
"description": "Grants permission to add or update the specified tags for the specified resource",
|
|
286
|
+
"accessLevel": "Tagging",
|
|
287
|
+
"resourceTypes": [
|
|
288
|
+
{
|
|
289
|
+
"name": "investigation-group",
|
|
290
|
+
"required": true,
|
|
291
|
+
"conditionKeys": [],
|
|
292
|
+
"dependentActions": []
|
|
293
|
+
}
|
|
294
|
+
],
|
|
295
|
+
"conditionKeys": [
|
|
296
|
+
"aws:TagKeys",
|
|
297
|
+
"aws:RequestTag/${TagKey}"
|
|
298
|
+
],
|
|
299
|
+
"dependentActions": []
|
|
300
|
+
},
|
|
301
|
+
"untagresource": {
|
|
302
|
+
"name": "UntagResource",
|
|
303
|
+
"description": "Grants permission to remove the specified tags from the specified resource",
|
|
304
|
+
"accessLevel": "Tagging",
|
|
305
|
+
"resourceTypes": [
|
|
306
|
+
{
|
|
307
|
+
"name": "investigation-group",
|
|
308
|
+
"required": true,
|
|
309
|
+
"conditionKeys": [],
|
|
310
|
+
"dependentActions": []
|
|
311
|
+
}
|
|
312
|
+
],
|
|
313
|
+
"conditionKeys": [
|
|
314
|
+
"aws:TagKeys"
|
|
315
|
+
],
|
|
316
|
+
"dependentActions": []
|
|
317
|
+
},
|
|
318
|
+
"updateinvestigation": {
|
|
319
|
+
"name": "UpdateInvestigation",
|
|
320
|
+
"description": "Grants permission to update an investigation in the specified investigation group",
|
|
321
|
+
"accessLevel": "Write",
|
|
322
|
+
"resourceTypes": [
|
|
323
|
+
{
|
|
324
|
+
"name": "investigation-group",
|
|
325
|
+
"required": true,
|
|
326
|
+
"conditionKeys": [],
|
|
327
|
+
"dependentActions": []
|
|
328
|
+
}
|
|
329
|
+
],
|
|
330
|
+
"conditionKeys": [],
|
|
331
|
+
"dependentActions": [
|
|
332
|
+
"kms:Decrypt",
|
|
333
|
+
"kms:GenerateDataKey",
|
|
334
|
+
"sts:SetContext"
|
|
335
|
+
]
|
|
336
|
+
},
|
|
337
|
+
"updateinvestigationevent": {
|
|
338
|
+
"name": "UpdateInvestigationEvent",
|
|
339
|
+
"description": "Grants permission to update an investigation event in the specified investigation group",
|
|
340
|
+
"accessLevel": "Write",
|
|
341
|
+
"resourceTypes": [
|
|
342
|
+
{
|
|
343
|
+
"name": "investigation-group",
|
|
344
|
+
"required": true,
|
|
345
|
+
"conditionKeys": [],
|
|
346
|
+
"dependentActions": []
|
|
347
|
+
}
|
|
348
|
+
],
|
|
349
|
+
"conditionKeys": [],
|
|
350
|
+
"dependentActions": [
|
|
351
|
+
"kms:Decrypt",
|
|
352
|
+
"kms:GenerateDataKey",
|
|
353
|
+
"sts:SetContext"
|
|
354
|
+
]
|
|
355
|
+
},
|
|
356
|
+
"updateinvestigationgroup": {
|
|
357
|
+
"name": "UpdateInvestigationGroup",
|
|
358
|
+
"description": "Grants permission to update the specified investigation group",
|
|
359
|
+
"accessLevel": "Write",
|
|
360
|
+
"resourceTypes": [
|
|
361
|
+
{
|
|
362
|
+
"name": "investigation-group",
|
|
363
|
+
"required": true,
|
|
364
|
+
"conditionKeys": [],
|
|
365
|
+
"dependentActions": []
|
|
366
|
+
}
|
|
367
|
+
],
|
|
368
|
+
"conditionKeys": [],
|
|
369
|
+
"dependentActions": [
|
|
370
|
+
"cloudtrail:DescribeTrails",
|
|
371
|
+
"iam:PassRole",
|
|
372
|
+
"kms:Decrypt",
|
|
373
|
+
"kms:DescribeKey",
|
|
374
|
+
"kms:GenerateDataKey",
|
|
375
|
+
"sso:CreateApplication",
|
|
376
|
+
"sso:DeleteApplication",
|
|
377
|
+
"sso:PutApplicationAccessScope",
|
|
378
|
+
"sso:PutApplicationAssignmentConfiguration",
|
|
379
|
+
"sso:PutApplicationAuthenticationMethod",
|
|
380
|
+
"sso:PutApplicationGrant",
|
|
381
|
+
"sso:TagResource"
|
|
382
|
+
]
|
|
383
|
+
}
|
|
384
|
+
}
|