cdk-iam-floyd 0.708.0 → 0.710.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 419 Services
20
- - 18517 Actions
21
- - 1989 Resource Types
22
- - 1951 Condition keys
19
+ - 421 Services
20
+ - 18549 Actions
21
+ - 1992 Resource Types
22
+ - 1957 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -446,6 +446,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
446
446
  AmazonGrafanaServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
447
447
  /** Provides full access to use Amazon GuardDuty. */
448
448
  AmazonGuardDutyFullAccess(): aws_iam.IManagedPolicy;
449
+ /** Provides full access to use Amazon GuardDuty */
450
+ AmazonGuardDutyFullAccessV2(): aws_iam.IManagedPolicy;
449
451
  /** GuardDuty malware protection uses the service-linked role (SLR) named AWSServiceRoleForAmazonGuardDutyMalwareProtection. This service-linked role allows GuardDuty malware protection to perform agent-less scans to detect malware. It allows GuardDuty to create snapshots in your account, and share the snapshots with the GuardDuty service account to scan for malware. It evaluates these shared snapshots and includes the retrieved EC2 instance metadata in the GuardDuty Malware Protection findings. The AWSServiceRoleForAmazonGuardDutyMalwareProtection service-linked role trusts the malware-protection.guardduty.amazonaws.com service to assume the role. */
450
452
  AmazonGuardDutyMalwareProtectionServiceRolePolicy(): aws_iam.IManagedPolicy;
451
453
  /** Provides read only access to Amazon GuardDuty resources */
@@ -834,6 +836,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
834
836
  AmazonSageMakerPartnerServiceCatalogProductsLambdaServiceRolePolicy(): aws_iam.IManagedPolicy;
835
837
  /** This Amazon Managed Policy grants permissions commonly needed for use with Callback steps and Lambda steps in SageMaker Model Building Pipelines. It is added to the AmazonSageMaker-ExecutionRole that can be created when setting up SageMaker Studio. It can also be attached to any other role that will be used for authoring or executing pipelines. */
836
838
  AmazonSageMakerPipelinesIntegrations(): aws_iam.IManagedPolicy;
839
+ /** This policy will be used By SageMaker Unified Studios to create VPC related resources for QuickSight */
840
+ AmazonSageMakerQuickSightVPCPolicy(): aws_iam.IManagedPolicy;
837
841
  /** Provides read only access to Amazon SageMaker via the AWS Management Console and SDK. */
838
842
  AmazonSageMakerReadOnly(): aws_iam.IManagedPolicy;
839
843
  /** Service role policy used by the AWS APIGateway within the AWS ServiceCatalog provisioned products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CloudWatch Logs and others. */
@@ -962,6 +966,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
962
966
  AmazonWorkSpacesServiceAccess(): aws_iam.IManagedPolicy;
963
967
  /** Provides full access to Amazon WorkSpaces Thin Client as well as limited access to required related services */
964
968
  AmazonWorkSpacesThinClientFullAccess(): aws_iam.IManagedPolicy;
969
+ /** Enables access to AWS Services and Resources used or managed by Amazon WorkSpaces Thin Client Monitoring */
970
+ AmazonWorkSpacesThinClientMonitoringServiceRolePolicy(): aws_iam.IManagedPolicy;
965
971
  /** Provides read-only access to Amazon WorkSpaces Thin Client and its dependencies */
966
972
  AmazonWorkSpacesThinClientReadOnlyAccess(): aws_iam.IManagedPolicy;
967
973
  /** Provides read-only access to Amazon WorkSpaces Web and its dependencies through the AWS Management Console, SDK, and CLI. */
@@ -1856,6 +1862,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1856
1862
  AWSMigrationHubStrategyServiceRolePolicy(): aws_iam.IManagedPolicy;
1857
1863
  /** Grants permissions to Amazon MSK Replicator to replicate data between MSK Clusters. */
1858
1864
  AWSMSKReplicatorExecutionRole(): aws_iam.IManagedPolicy;
1865
+ /** Grants full access to AWS Network Firewall service, including permissions to create, configure, manage, and delete firewall resources, policies, and rule groups. Additionally includes permissions to modify VPC endpoints, S3 bucket policies, CloudWatch Logs configurations, and create service-linked roles for Network Firewall and log delivery services */
1866
+ AWSNetworkFirewallFullAccess(): aws_iam.IManagedPolicy;
1867
+ /** Provides read-only access to AWS Network Firewall resources via the AWS Management Console, CLI, and SDKs. This policy allows users to view and monitor firewall configurations, policies, rule groups, and associated resources, without the ability to make changes. */
1868
+ AWSNetworkFirewallReadOnlyAccess(): aws_iam.IManagedPolicy;
1859
1869
  /** Allow AWSNetworkFirewall to create and manage necessary resources for your Firewalls. */
1860
1870
  AWSNetworkFirewallServiceRolePolicy(): aws_iam.IManagedPolicy;
1861
1871
  /** Allow NetworkManager to access resources associated with your Core Network */
@@ -2070,6 +2080,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2070
2080
  AWSSecurityHubReadOnlyAccess(): aws_iam.IManagedPolicy;
2071
2081
  /** A service-linked role required for AWS Security Hub to access your resources. */
2072
2082
  AWSSecurityHubServiceRolePolicy(): aws_iam.IManagedPolicy;
2083
+ /** This policy allows Security Hub to manage AWS Config rules and Security Hub resources in your organization and on your behalf. */
2084
+ AWSSecurityHubV2ServiceRolePolicy(): aws_iam.IManagedPolicy;
2073
2085
  /** Policy provides customers with Read and Write permissions to case resources that are created through the Security Incident Response service. */
2074
2086
  AWSSecurityIncidentResponseCaseFullAccess(): aws_iam.IManagedPolicy;
2075
2087
  /** Policy provides customers with Read and Write permissions to all resources associated to the Security Incident Response service. */
@@ -2138,6 +2150,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2138
2150
  AWSServiceRolePolicyForBackupReports(): aws_iam.IManagedPolicy;
2139
2151
  /** This policy contains permissions for testing restores and for cleaning up resources created during tests. */
2140
2152
  AWSServiceRolePolicyForBackupRestoreTesting(): aws_iam.IManagedPolicy;
2153
+ /** This managed policy provides administrative access to Amazon WorkSpaces to manage EC2 instances in your AWS account */
2154
+ AWSServiceRolePolicyForWorkspacesInstances(): aws_iam.IManagedPolicy;
2141
2155
  /** Provides the AWS DDoS Response Team with limited access to your AWS account to assist with DDoS attack mitigation during a high-severity event. */
2142
2156
  AWSShieldDRTAccessPolicy(): aws_iam.IManagedPolicy;
2143
2157
  /** Allows AWS Shield to access AWS resources on your behalf to provide DDoS protection. */
@@ -2550,6 +2564,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2550
2564
  NeptuneReadOnlyAccess(): aws_iam.IManagedPolicy;
2551
2565
  /** Grants full access permissions to AWS services and actions required to set up and configure AWS network resources. */
2552
2566
  NetworkAdministrator(): aws_iam.IManagedPolicy;
2567
+ /** Provides permissions for the AWS Shield network security director service linked role to assess specified environments. */
2568
+ NetworkSecurityDirectorServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
2553
2569
  /** Provides full access to CloudWatch Observability Access Manager */
2554
2570
  OAMFullAccess(): aws_iam.IManagedPolicy;
2555
2571
  /** Provides Read Only access to CloudWatch Observability Access Manager */