aws-iam-managed-policies 0.0.491 → 0.0.492
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/managedPolicies.json +598 -9
- package/package.json +1 -1
|
@@ -609527,8 +609527,8 @@
|
|
|
609527
609527
|
},
|
|
609528
609528
|
"AWSLambda_FullAccess": {
|
|
609529
609529
|
"arn": "arn:aws:iam::aws:policy/AWSLambda_FullAccess",
|
|
609530
|
-
"latestVersionId": "
|
|
609531
|
-
"versionsCount":
|
|
609530
|
+
"latestVersionId": "v3",
|
|
609531
|
+
"versionsCount": 3,
|
|
609532
609532
|
"versions": {
|
|
609533
609533
|
"v1": {
|
|
609534
609534
|
"createdDate": "2020-11-17T21:14:08.000Z",
|
|
@@ -609641,10 +609641,78 @@
|
|
|
609641
609641
|
}
|
|
609642
609642
|
]
|
|
609643
609643
|
}
|
|
609644
|
+
},
|
|
609645
|
+
"v3": {
|
|
609646
|
+
"createdDate": "2020-11-17T21:14:08.000Z",
|
|
609647
|
+
"document": {
|
|
609648
|
+
"Version": "2012-10-17",
|
|
609649
|
+
"Statement": [
|
|
609650
|
+
{
|
|
609651
|
+
"Effect": "Allow",
|
|
609652
|
+
"Action": [
|
|
609653
|
+
"cloudformation:DescribeStacks",
|
|
609654
|
+
"cloudformation:ListStackResources",
|
|
609655
|
+
"cloudwatch:ListMetrics",
|
|
609656
|
+
"cloudwatch:GetMetricData",
|
|
609657
|
+
"ec2:DescribeSecurityGroups",
|
|
609658
|
+
"ec2:DescribeSubnets",
|
|
609659
|
+
"ec2:DescribeVpcs",
|
|
609660
|
+
"kms:DescribeKey",
|
|
609661
|
+
"kms:ListAliases",
|
|
609662
|
+
"iam:GetPolicy",
|
|
609663
|
+
"iam:GetPolicyVersion",
|
|
609664
|
+
"iam:GetRole",
|
|
609665
|
+
"iam:GetRolePolicy",
|
|
609666
|
+
"iam:ListAttachedRolePolicies",
|
|
609667
|
+
"iam:ListRolePolicies",
|
|
609668
|
+
"iam:ListRoles",
|
|
609669
|
+
"lambda:*",
|
|
609670
|
+
"logs:DescribeLogGroups",
|
|
609671
|
+
"states:DescribeStateMachine",
|
|
609672
|
+
"states:ListStateMachines",
|
|
609673
|
+
"tag:GetResources",
|
|
609674
|
+
"xray:GetTraceSummaries",
|
|
609675
|
+
"xray:BatchGetTraces"
|
|
609676
|
+
],
|
|
609677
|
+
"Resource": "*"
|
|
609678
|
+
},
|
|
609679
|
+
{
|
|
609680
|
+
"Effect": "Allow",
|
|
609681
|
+
"Action": "iam:PassRole",
|
|
609682
|
+
"Resource": "*",
|
|
609683
|
+
"Condition": {
|
|
609684
|
+
"StringEquals": {
|
|
609685
|
+
"iam:PassedToService": "lambda.amazonaws.com"
|
|
609686
|
+
}
|
|
609687
|
+
}
|
|
609688
|
+
},
|
|
609689
|
+
{
|
|
609690
|
+
"Effect": "Allow",
|
|
609691
|
+
"Action": [
|
|
609692
|
+
"logs:DescribeLogStreams",
|
|
609693
|
+
"logs:GetLogEvents",
|
|
609694
|
+
"logs:FilterLogEvents",
|
|
609695
|
+
"logs:StartLiveTail",
|
|
609696
|
+
"logs:StopLiveTail"
|
|
609697
|
+
],
|
|
609698
|
+
"Resource": "arn:aws:logs:*:*:log-group:/aws/lambda/*"
|
|
609699
|
+
},
|
|
609700
|
+
{
|
|
609701
|
+
"Effect": "Allow",
|
|
609702
|
+
"Action": "iam:CreateServiceLinkedRole",
|
|
609703
|
+
"Resource": "arn:aws:iam::*:role/aws-service-role/lambda.amazonaws.com/AWSServiceRoleForLambda",
|
|
609704
|
+
"Condition": {
|
|
609705
|
+
"StringEquals": {
|
|
609706
|
+
"iam:AWSServiceName": "lambda.amazonaws.com"
|
|
609707
|
+
}
|
|
609708
|
+
}
|
|
609709
|
+
}
|
|
609710
|
+
]
|
|
609711
|
+
}
|
|
609644
609712
|
}
|
|
609645
609713
|
},
|
|
609646
609714
|
"createdDate": "2020-11-17T21:14:08.000Z",
|
|
609647
|
-
"lastUpdatedDate": "2025-
|
|
609715
|
+
"lastUpdatedDate": "2025-12-01T16:04:11.000Z"
|
|
609648
609716
|
},
|
|
609649
609717
|
"AmazonHoneycodeServiceRolePolicy": {
|
|
609650
609718
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonHoneycodeServiceRolePolicy",
|
|
@@ -954605,8 +954673,8 @@
|
|
|
954605
954673
|
},
|
|
954606
954674
|
"AWSServiceRoleForAWSTransform": {
|
|
954607
954675
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForAWSTransform",
|
|
954608
|
-
"latestVersionId": "
|
|
954609
|
-
"versionsCount":
|
|
954676
|
+
"latestVersionId": "v4",
|
|
954677
|
+
"versionsCount": 4,
|
|
954610
954678
|
"versions": {
|
|
954611
954679
|
"v1": {
|
|
954612
954680
|
"createdDate": "2025-05-15T13:37:07.000Z",
|
|
@@ -954732,10 +954800,103 @@
|
|
|
954732
954800
|
}
|
|
954733
954801
|
]
|
|
954734
954802
|
}
|
|
954803
|
+
},
|
|
954804
|
+
"v4": {
|
|
954805
|
+
"createdDate": "2025-05-15T13:37:07.000Z",
|
|
954806
|
+
"document": {
|
|
954807
|
+
"Version": "2012-10-17",
|
|
954808
|
+
"Statement": [
|
|
954809
|
+
{
|
|
954810
|
+
"Sid": "PublishCloudWatchMetrics",
|
|
954811
|
+
"Effect": "Allow",
|
|
954812
|
+
"Action": [
|
|
954813
|
+
"cloudwatch:PutMetricData"
|
|
954814
|
+
],
|
|
954815
|
+
"Resource": "*",
|
|
954816
|
+
"Condition": {
|
|
954817
|
+
"StringEquals": {
|
|
954818
|
+
"cloudwatch:namespace": [
|
|
954819
|
+
"AWS/Transform"
|
|
954820
|
+
]
|
|
954821
|
+
}
|
|
954822
|
+
}
|
|
954823
|
+
},
|
|
954824
|
+
{
|
|
954825
|
+
"Sid": "UserManagementPolicy",
|
|
954826
|
+
"Effect": "Allow",
|
|
954827
|
+
"Action": [
|
|
954828
|
+
"sso:DescribeApplication",
|
|
954829
|
+
"sso:GetApplicationAssignmentConfiguration",
|
|
954830
|
+
"sso:ListApplicationAssignmentsForPrincipal"
|
|
954831
|
+
],
|
|
954832
|
+
"Resource": [
|
|
954833
|
+
"*"
|
|
954834
|
+
]
|
|
954835
|
+
},
|
|
954836
|
+
{
|
|
954837
|
+
"Sid": "AllowKmsAccessViaIdentityCenter",
|
|
954838
|
+
"Effect": "Allow",
|
|
954839
|
+
"Action": [
|
|
954840
|
+
"kms:Decrypt"
|
|
954841
|
+
],
|
|
954842
|
+
"Resource": "*",
|
|
954843
|
+
"Condition": {
|
|
954844
|
+
"ArnLike": {
|
|
954845
|
+
"kms:EncryptionContext:aws:sso:instance-arn": "arn:*:sso:::instance/*"
|
|
954846
|
+
},
|
|
954847
|
+
"StringLike": {
|
|
954848
|
+
"kms:ViaService": "sso.*.amazonaws.com"
|
|
954849
|
+
}
|
|
954850
|
+
}
|
|
954851
|
+
},
|
|
954852
|
+
{
|
|
954853
|
+
"Sid": "AllowKmsAccessViaIdentityStore",
|
|
954854
|
+
"Effect": "Allow",
|
|
954855
|
+
"Action": [
|
|
954856
|
+
"kms:Decrypt"
|
|
954857
|
+
],
|
|
954858
|
+
"Resource": "*",
|
|
954859
|
+
"Condition": {
|
|
954860
|
+
"ArnLike": {
|
|
954861
|
+
"kms:EncryptionContext:aws:identitystore:identitystore-arn": "arn:*:identitystore::*:identitystore/*"
|
|
954862
|
+
},
|
|
954863
|
+
"StringLike": {
|
|
954864
|
+
"kms:ViaService": "identitystore.*.amazonaws.com"
|
|
954865
|
+
}
|
|
954866
|
+
}
|
|
954867
|
+
},
|
|
954868
|
+
{
|
|
954869
|
+
"Sid": "SupportCaseManagement",
|
|
954870
|
+
"Effect": "Allow",
|
|
954871
|
+
"Action": [
|
|
954872
|
+
"support:CreateCase",
|
|
954873
|
+
"support:DescribeCases",
|
|
954874
|
+
"support:DescribeCommunications",
|
|
954875
|
+
"support:AddCommunicationToCase",
|
|
954876
|
+
"support:ResolveCase"
|
|
954877
|
+
],
|
|
954878
|
+
"Resource": "*"
|
|
954879
|
+
},
|
|
954880
|
+
{
|
|
954881
|
+
"Sid": "ExternalIdpSecretsAccess",
|
|
954882
|
+
"Effect": "Allow",
|
|
954883
|
+
"Action": [
|
|
954884
|
+
"secretsmanager:GetSecretValue"
|
|
954885
|
+
],
|
|
954886
|
+
"Resource": "arn:aws:secretsmanager:*:*:secret:transform!*",
|
|
954887
|
+
"Condition": {
|
|
954888
|
+
"StringEquals": {
|
|
954889
|
+
"secretsmanager:ResourceTag/aws:secretsmanager:owningService": "transform",
|
|
954890
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
954891
|
+
}
|
|
954892
|
+
}
|
|
954893
|
+
}
|
|
954894
|
+
]
|
|
954895
|
+
}
|
|
954735
954896
|
}
|
|
954736
954897
|
},
|
|
954737
954898
|
"createdDate": "2025-05-15T13:37:07.000Z",
|
|
954738
|
-
"lastUpdatedDate": "2025-
|
|
954899
|
+
"lastUpdatedDate": "2025-12-01T13:19:12.000Z"
|
|
954739
954900
|
},
|
|
954740
954901
|
"CloudTrailEventContext": {
|
|
954741
954902
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/CloudTrailEventContext",
|
|
@@ -959967,8 +960128,8 @@
|
|
|
959967
960128
|
},
|
|
959968
960129
|
"AWSObservabilityAdminTelemetryEnablementServiceRolePolicy": {
|
|
959969
960130
|
"arn": "arn:aws:iam::aws:policy/aws-service-role/AWSObservabilityAdminTelemetryEnablementServiceRolePolicy",
|
|
959970
|
-
"latestVersionId": "
|
|
959971
|
-
"versionsCount":
|
|
960131
|
+
"latestVersionId": "v2",
|
|
960132
|
+
"versionsCount": 2,
|
|
959972
960133
|
"versions": {
|
|
959973
960134
|
"v1": {
|
|
959974
960135
|
"createdDate": "2025-08-01T18:04:06.000Z",
|
|
@@ -960133,10 +960294,438 @@
|
|
|
960133
960294
|
}
|
|
960134
960295
|
]
|
|
960135
960296
|
}
|
|
960297
|
+
},
|
|
960298
|
+
"v2": {
|
|
960299
|
+
"createdDate": "2025-08-01T18:04:06.000Z",
|
|
960300
|
+
"document": {
|
|
960301
|
+
"Version": "2012-10-17",
|
|
960302
|
+
"Statement": [
|
|
960303
|
+
{
|
|
960304
|
+
"Sid": "TelemetryOperations",
|
|
960305
|
+
"Effect": "Allow",
|
|
960306
|
+
"Action": [
|
|
960307
|
+
"ec2:DescribeFlowLogs",
|
|
960308
|
+
"ec2:DescribeVpcs",
|
|
960309
|
+
"logs:DescribeLogGroups",
|
|
960310
|
+
"logs:DescribeResourcePolicies",
|
|
960311
|
+
"logs:ListLogGroups"
|
|
960312
|
+
],
|
|
960313
|
+
"Resource": "*",
|
|
960314
|
+
"Condition": {
|
|
960315
|
+
"StringEquals": {
|
|
960316
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960317
|
+
}
|
|
960318
|
+
}
|
|
960319
|
+
},
|
|
960320
|
+
{
|
|
960321
|
+
"Sid": "TagOperationForEC2",
|
|
960322
|
+
"Effect": "Allow",
|
|
960323
|
+
"Action": [
|
|
960324
|
+
"ec2:CreateTags"
|
|
960325
|
+
],
|
|
960326
|
+
"Resource": "*",
|
|
960327
|
+
"Condition": {
|
|
960328
|
+
"StringEquals": {
|
|
960329
|
+
"aws:RequestTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960330
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}",
|
|
960331
|
+
"ec2:CreateAction": "CreateFlowLogs"
|
|
960332
|
+
},
|
|
960333
|
+
"ForAllValues:StringEquals": {
|
|
960334
|
+
"aws:TagKeys": "CloudWatchTelemetryRuleManaged"
|
|
960335
|
+
}
|
|
960336
|
+
}
|
|
960337
|
+
},
|
|
960338
|
+
{
|
|
960339
|
+
"Sid": "TagOperationForLogs",
|
|
960340
|
+
"Effect": "Allow",
|
|
960341
|
+
"Action": [
|
|
960342
|
+
"logs:TagResource"
|
|
960343
|
+
],
|
|
960344
|
+
"Resource": "*",
|
|
960345
|
+
"Condition": {
|
|
960346
|
+
"StringEquals": {
|
|
960347
|
+
"aws:ResourceTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960348
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960349
|
+
},
|
|
960350
|
+
"ForAllValues:StringEquals": {
|
|
960351
|
+
"aws:TagKeys": "CloudWatchTelemetryRuleManaged"
|
|
960352
|
+
}
|
|
960353
|
+
}
|
|
960354
|
+
},
|
|
960355
|
+
{
|
|
960356
|
+
"Sid": "TelemetryOperationsForVPCLogs",
|
|
960357
|
+
"Effect": "Allow",
|
|
960358
|
+
"Action": [
|
|
960359
|
+
"ec2:CreateFlowLogs"
|
|
960360
|
+
],
|
|
960361
|
+
"Resource": "arn:aws:ec2:*:*:vpc/*",
|
|
960362
|
+
"Condition": {
|
|
960363
|
+
"StringEquals": {
|
|
960364
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960365
|
+
}
|
|
960366
|
+
}
|
|
960367
|
+
},
|
|
960368
|
+
{
|
|
960369
|
+
"Sid": "TelemetryOperationsForVPCFlowLogs",
|
|
960370
|
+
"Effect": "Allow",
|
|
960371
|
+
"Action": [
|
|
960372
|
+
"ec2:CreateFlowLogs"
|
|
960373
|
+
],
|
|
960374
|
+
"Resource": "arn:aws:ec2:*:*:vpc-flow-log/*",
|
|
960375
|
+
"Condition": {
|
|
960376
|
+
"StringEquals": {
|
|
960377
|
+
"aws:RequestTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960378
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960379
|
+
},
|
|
960380
|
+
"ForAllValues:StringEquals": {
|
|
960381
|
+
"aws:TagKeys": "CloudWatchTelemetryRuleManaged"
|
|
960382
|
+
}
|
|
960383
|
+
}
|
|
960384
|
+
},
|
|
960385
|
+
{
|
|
960386
|
+
"Sid": "TelemetryOperationsForLogs",
|
|
960387
|
+
"Effect": "Allow",
|
|
960388
|
+
"Action": [
|
|
960389
|
+
"ec2:DeleteFlowLogs",
|
|
960390
|
+
"logs:CreateDelivery",
|
|
960391
|
+
"logs:CreateLogGroup",
|
|
960392
|
+
"logs:PutResourcePolicy",
|
|
960393
|
+
"logs:PutRetentionPolicy",
|
|
960394
|
+
"logs:PutDeliveryDestination",
|
|
960395
|
+
"logs:PutDeliverySource",
|
|
960396
|
+
"logs:CreateLogStream",
|
|
960397
|
+
"logs:DescribeLogGroups"
|
|
960398
|
+
],
|
|
960399
|
+
"Resource": "*",
|
|
960400
|
+
"Condition": {
|
|
960401
|
+
"StringEquals": {
|
|
960402
|
+
"aws:ResourceTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960403
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960404
|
+
}
|
|
960405
|
+
}
|
|
960406
|
+
},
|
|
960407
|
+
{
|
|
960408
|
+
"Sid": "TelemetryOperationsForEKSApiLogs",
|
|
960409
|
+
"Effect": "Allow",
|
|
960410
|
+
"Action": [
|
|
960411
|
+
"eks:UpdateClusterConfig"
|
|
960412
|
+
],
|
|
960413
|
+
"Resource": "arn:aws:eks:*:*:cluster/*",
|
|
960414
|
+
"Condition": {
|
|
960415
|
+
"StringEquals": {
|
|
960416
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960417
|
+
},
|
|
960418
|
+
"Bool": {
|
|
960419
|
+
"eks:loggingType/api": "true"
|
|
960420
|
+
}
|
|
960421
|
+
}
|
|
960422
|
+
},
|
|
960423
|
+
{
|
|
960424
|
+
"Sid": "TelemetryOperationsForEKSAuditLogs",
|
|
960425
|
+
"Effect": "Allow",
|
|
960426
|
+
"Action": [
|
|
960427
|
+
"eks:UpdateClusterConfig"
|
|
960428
|
+
],
|
|
960429
|
+
"Resource": "arn:aws:eks:*:*:cluster/*",
|
|
960430
|
+
"Condition": {
|
|
960431
|
+
"StringEquals": {
|
|
960432
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960433
|
+
},
|
|
960434
|
+
"Bool": {
|
|
960435
|
+
"eks:loggingType/audit": "true"
|
|
960436
|
+
}
|
|
960437
|
+
}
|
|
960438
|
+
},
|
|
960439
|
+
{
|
|
960440
|
+
"Sid": "TelemetryOperationsForEKSAuthenticatorLogs",
|
|
960441
|
+
"Effect": "Allow",
|
|
960442
|
+
"Action": [
|
|
960443
|
+
"eks:UpdateClusterConfig"
|
|
960444
|
+
],
|
|
960445
|
+
"Resource": "arn:aws:eks:*:*:cluster/*",
|
|
960446
|
+
"Condition": {
|
|
960447
|
+
"StringEquals": {
|
|
960448
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960449
|
+
},
|
|
960450
|
+
"Bool": {
|
|
960451
|
+
"eks:loggingType/authenticator": "true"
|
|
960452
|
+
}
|
|
960453
|
+
}
|
|
960454
|
+
},
|
|
960455
|
+
{
|
|
960456
|
+
"Sid": "TelemetryOperationsForEKSControllerManagerLogs",
|
|
960457
|
+
"Effect": "Allow",
|
|
960458
|
+
"Action": [
|
|
960459
|
+
"eks:UpdateClusterConfig"
|
|
960460
|
+
],
|
|
960461
|
+
"Resource": "arn:aws:eks:*:*:cluster/*",
|
|
960462
|
+
"Condition": {
|
|
960463
|
+
"StringEquals": {
|
|
960464
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960465
|
+
},
|
|
960466
|
+
"Bool": {
|
|
960467
|
+
"eks:loggingType/controllerManager": "true"
|
|
960468
|
+
}
|
|
960469
|
+
}
|
|
960470
|
+
},
|
|
960471
|
+
{
|
|
960472
|
+
"Sid": "TelemetryOperationsForEKSSchedulerLogs",
|
|
960473
|
+
"Effect": "Allow",
|
|
960474
|
+
"Action": [
|
|
960475
|
+
"eks:UpdateClusterConfig"
|
|
960476
|
+
],
|
|
960477
|
+
"Resource": "arn:aws:eks:*:*:cluster/*",
|
|
960478
|
+
"Condition": {
|
|
960479
|
+
"StringEquals": {
|
|
960480
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960481
|
+
},
|
|
960482
|
+
"Bool": {
|
|
960483
|
+
"eks:loggingType/scheduler": "true"
|
|
960484
|
+
}
|
|
960485
|
+
}
|
|
960486
|
+
},
|
|
960487
|
+
{
|
|
960488
|
+
"Sid": "TelemetryOperationsForWafLoggingConfigurations",
|
|
960489
|
+
"Effect": "Allow",
|
|
960490
|
+
"Action": [
|
|
960491
|
+
"wafv2:PutLoggingConfiguration"
|
|
960492
|
+
],
|
|
960493
|
+
"Resource": "arn:aws:wafv2:*:*:regional/webacl/*",
|
|
960494
|
+
"Condition": {
|
|
960495
|
+
"ArnLike": {
|
|
960496
|
+
"wafv2:LogDestinationResource": "arn:aws:logs:*:*:log-group:*"
|
|
960497
|
+
},
|
|
960498
|
+
"StringEquals": {
|
|
960499
|
+
"wafv2:LogScope": "CloudwatchTelemetryRuleManaged",
|
|
960500
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960501
|
+
}
|
|
960502
|
+
}
|
|
960503
|
+
},
|
|
960504
|
+
{
|
|
960505
|
+
"Sid": "TelemetryOperationsForWafLogDelivery",
|
|
960506
|
+
"Effect": "Allow",
|
|
960507
|
+
"Action": [
|
|
960508
|
+
"logs:CreateLogDelivery"
|
|
960509
|
+
],
|
|
960510
|
+
"Resource": "*",
|
|
960511
|
+
"Condition": {
|
|
960512
|
+
"ForAnyValue:StringEquals": {
|
|
960513
|
+
"aws:CalledVia": [
|
|
960514
|
+
"wafv2.amazonaws.com"
|
|
960515
|
+
]
|
|
960516
|
+
},
|
|
960517
|
+
"StringEquals": {
|
|
960518
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960519
|
+
}
|
|
960520
|
+
}
|
|
960521
|
+
},
|
|
960522
|
+
{
|
|
960523
|
+
"Sid": "TelemetryOperationsForELB",
|
|
960524
|
+
"Effect": "Allow",
|
|
960525
|
+
"Action": [
|
|
960526
|
+
"elasticloadbalancing:AllowVendedLogDeliveryForResource"
|
|
960527
|
+
],
|
|
960528
|
+
"Resource": "*",
|
|
960529
|
+
"Condition": {
|
|
960530
|
+
"StringEquals": {
|
|
960531
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960532
|
+
}
|
|
960533
|
+
}
|
|
960534
|
+
},
|
|
960535
|
+
{
|
|
960536
|
+
"Sid": "TelemetryOperationsForBedrock",
|
|
960537
|
+
"Effect": "Allow",
|
|
960538
|
+
"Action": [
|
|
960539
|
+
"bedrock-agentcore:AllowVendedLogDeliveryForResource"
|
|
960540
|
+
],
|
|
960541
|
+
"Resource": "*",
|
|
960542
|
+
"Condition": {
|
|
960543
|
+
"StringEquals": {
|
|
960544
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960545
|
+
}
|
|
960546
|
+
}
|
|
960547
|
+
},
|
|
960548
|
+
{
|
|
960549
|
+
"Sid": "TelemetryOperationsForCloudTrailLogs",
|
|
960550
|
+
"Effect": "Allow",
|
|
960551
|
+
"Action": [
|
|
960552
|
+
"cloudtrail:CreateServiceLinkedChannel",
|
|
960553
|
+
"cloudtrail:UpdateServiceLinkedChannel",
|
|
960554
|
+
"cloudtrail:DeleteServiceLinkedChannel"
|
|
960555
|
+
],
|
|
960556
|
+
"Resource": "arn:aws:cloudtrail:*:*:channel/aws-service-channel/cloudwatch/*",
|
|
960557
|
+
"Condition": {
|
|
960558
|
+
"StringEquals": {
|
|
960559
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960560
|
+
}
|
|
960561
|
+
}
|
|
960562
|
+
},
|
|
960563
|
+
{
|
|
960564
|
+
"Sid": "TelemetryOperationsForManagedLogs",
|
|
960565
|
+
"Effect": "Allow",
|
|
960566
|
+
"Action": [
|
|
960567
|
+
"logs:CreateLogGroup",
|
|
960568
|
+
"logs:PutResourcePolicy",
|
|
960569
|
+
"logs:PutRetentionPolicy"
|
|
960570
|
+
],
|
|
960571
|
+
"Resource": [
|
|
960572
|
+
"arn:aws:logs:*:*:log-group:aws/cloudtrail",
|
|
960573
|
+
"arn:aws:logs:*:*:log-group:aws/cloudtrail/*"
|
|
960574
|
+
],
|
|
960575
|
+
"Condition": {
|
|
960576
|
+
"StringEquals": {
|
|
960577
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960578
|
+
}
|
|
960579
|
+
}
|
|
960580
|
+
},
|
|
960581
|
+
{
|
|
960582
|
+
"Sid": "Route53QueryLoggingListOperations",
|
|
960583
|
+
"Effect": "Allow",
|
|
960584
|
+
"Action": [
|
|
960585
|
+
"route53resolver:ListResolverQueryLogConfigs",
|
|
960586
|
+
"route53resolver:ListResolverQueryLogConfigAssociations"
|
|
960587
|
+
],
|
|
960588
|
+
"Resource": "*",
|
|
960589
|
+
"Condition": {
|
|
960590
|
+
"StringEquals": {
|
|
960591
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960592
|
+
}
|
|
960593
|
+
}
|
|
960594
|
+
},
|
|
960595
|
+
{
|
|
960596
|
+
"Sid": "Route53QueryLoggingGetOperations",
|
|
960597
|
+
"Effect": "Allow",
|
|
960598
|
+
"Action": [
|
|
960599
|
+
"route53resolver:GetResolverQueryLogConfig",
|
|
960600
|
+
"route53resolver:ListTagsForResource"
|
|
960601
|
+
],
|
|
960602
|
+
"Resource": "*",
|
|
960603
|
+
"Condition": {
|
|
960604
|
+
"StringEquals": {
|
|
960605
|
+
"aws:ResourceTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960606
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960607
|
+
}
|
|
960608
|
+
}
|
|
960609
|
+
},
|
|
960610
|
+
{
|
|
960611
|
+
"Sid": "Route53QueryLoggingConfigCreation",
|
|
960612
|
+
"Effect": "Allow",
|
|
960613
|
+
"Action": [
|
|
960614
|
+
"route53resolver:CreateResolverQueryLogConfig",
|
|
960615
|
+
"route53resolver:TagResource"
|
|
960616
|
+
],
|
|
960617
|
+
"Resource": "arn:aws:route53resolver:*:*:resolver-query-log-config/*",
|
|
960618
|
+
"Condition": {
|
|
960619
|
+
"StringEquals": {
|
|
960620
|
+
"aws:RequestTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960621
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960622
|
+
}
|
|
960623
|
+
}
|
|
960624
|
+
},
|
|
960625
|
+
{
|
|
960626
|
+
"Sid": "Route53QueryLoggingConfigAssociation",
|
|
960627
|
+
"Effect": "Allow",
|
|
960628
|
+
"Action": [
|
|
960629
|
+
"route53resolver:AssociateResolverQueryLogConfig"
|
|
960630
|
+
],
|
|
960631
|
+
"Resource": "*",
|
|
960632
|
+
"Condition": {
|
|
960633
|
+
"StringEquals": {
|
|
960634
|
+
"aws:ResourceTag/CloudWatchTelemetryRuleManaged": "true",
|
|
960635
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960636
|
+
}
|
|
960637
|
+
}
|
|
960638
|
+
},
|
|
960639
|
+
{
|
|
960640
|
+
"Sid": "TelemetryOperationsForRoute53LogDeliverySLR",
|
|
960641
|
+
"Effect": "Allow",
|
|
960642
|
+
"Action": [
|
|
960643
|
+
"iam:CreateServiceLinkedRole"
|
|
960644
|
+
],
|
|
960645
|
+
"Resource": "arn:*:iam::*:role/aws-service-role/route53resolver.amazonaws.com/AWSServiceRoleForRoute53Resolver",
|
|
960646
|
+
"Condition": {
|
|
960647
|
+
"StringEquals": {
|
|
960648
|
+
"iam:AWSServiceName": [
|
|
960649
|
+
"route53resolver.amazonaws.com"
|
|
960650
|
+
],
|
|
960651
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960652
|
+
},
|
|
960653
|
+
"BoolIfExists": {
|
|
960654
|
+
"aws:ViaAWSService": "true"
|
|
960655
|
+
}
|
|
960656
|
+
}
|
|
960657
|
+
},
|
|
960658
|
+
{
|
|
960659
|
+
"Sid": "TelemetryOperationsForRoute53LogDelivery",
|
|
960660
|
+
"Effect": "Allow",
|
|
960661
|
+
"Action": [
|
|
960662
|
+
"logs:CreateLogDelivery"
|
|
960663
|
+
],
|
|
960664
|
+
"Resource": "*"
|
|
960665
|
+
},
|
|
960666
|
+
{
|
|
960667
|
+
"Sid": "IAMOperationsForConfigServiceLinkedRecorder",
|
|
960668
|
+
"Effect": "Allow",
|
|
960669
|
+
"Action": [
|
|
960670
|
+
"iam:CreateServiceLinkedRole"
|
|
960671
|
+
],
|
|
960672
|
+
"Resource": [
|
|
960673
|
+
"arn:aws:iam::*:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig"
|
|
960674
|
+
],
|
|
960675
|
+
"Condition": {
|
|
960676
|
+
"StringEquals": {
|
|
960677
|
+
"iam:AWSServiceName": [
|
|
960678
|
+
"config.amazonaws.com"
|
|
960679
|
+
],
|
|
960680
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960681
|
+
},
|
|
960682
|
+
"BoolIfExists": {
|
|
960683
|
+
"aws:ViaAWSService": "true"
|
|
960684
|
+
}
|
|
960685
|
+
}
|
|
960686
|
+
},
|
|
960687
|
+
{
|
|
960688
|
+
"Sid": "ManagementOperationsForServiceLinkedRecorder",
|
|
960689
|
+
"Effect": "Allow",
|
|
960690
|
+
"Action": [
|
|
960691
|
+
"config:PutServiceLinkedConfigurationRecorder",
|
|
960692
|
+
"config:DeleteServiceLinkedConfigurationRecorder",
|
|
960693
|
+
"config:AssociateResourceTypes",
|
|
960694
|
+
"config:DisassociateResourceTypes"
|
|
960695
|
+
],
|
|
960696
|
+
"Resource": [
|
|
960697
|
+
"arn:aws:config:*:*:configuration-recorder/AWSConfigurationRecorderForObservabilityAdmin_TelemetryEnablement/*"
|
|
960698
|
+
],
|
|
960699
|
+
"Condition": {
|
|
960700
|
+
"StringEquals": {
|
|
960701
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960702
|
+
}
|
|
960703
|
+
}
|
|
960704
|
+
},
|
|
960705
|
+
{
|
|
960706
|
+
"Sid": "ReadOperationsForServiceLinkedRecorder",
|
|
960707
|
+
"Effect": "Allow",
|
|
960708
|
+
"Action": [
|
|
960709
|
+
"config:DescribeConfigurationRecorders"
|
|
960710
|
+
],
|
|
960711
|
+
"Resource": [
|
|
960712
|
+
"*"
|
|
960713
|
+
],
|
|
960714
|
+
"Condition": {
|
|
960715
|
+
"StringEquals": {
|
|
960716
|
+
"config:ConfigurationRecorderServicePrincipal": [
|
|
960717
|
+
"telemetry-enablement.observabilityadmin.amazonaws.com"
|
|
960718
|
+
],
|
|
960719
|
+
"aws:ResourceAccount": "${aws:PrincipalAccount}"
|
|
960720
|
+
}
|
|
960721
|
+
}
|
|
960722
|
+
}
|
|
960723
|
+
]
|
|
960724
|
+
}
|
|
960136
960725
|
}
|
|
960137
960726
|
},
|
|
960138
960727
|
"createdDate": "2025-08-01T18:04:06.000Z",
|
|
960139
|
-
"lastUpdatedDate": "2025-
|
|
960728
|
+
"lastUpdatedDate": "2025-12-02T01:19:06.000Z"
|
|
960140
960729
|
},
|
|
960141
960730
|
"AWSQuickSetupStartStopInstancesExecutionPolicy": {
|
|
960142
960731
|
"arn": "arn:aws:iam::aws:policy/AWSQuickSetupStartStopInstancesExecutionPolicy",
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "aws-iam-managed-policies",
|
|
3
|
-
"version": "0.0.
|
|
3
|
+
"version": "0.0.492",
|
|
4
4
|
"description": "Provides AWS IAM Managed Policies historical data as a convenient npm package that can be used in other OSS projects.",
|
|
5
5
|
"main": "./dist/index.js",
|
|
6
6
|
"types": "./dist/index.d.ts",
|