cdk-iam-floyd 0.709.0 → 0.710.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 418 Services
20
- - 18514 Actions
21
- - 1989 Resource Types
22
- - 1951 Condition keys
19
+ - 421 Services
20
+ - 18549 Actions
21
+ - 1992 Resource Types
22
+ - 1957 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -966,6 +966,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
966
966
  AmazonWorkSpacesServiceAccess(): aws_iam.IManagedPolicy;
967
967
  /** Provides full access to Amazon WorkSpaces Thin Client as well as limited access to required related services */
968
968
  AmazonWorkSpacesThinClientFullAccess(): aws_iam.IManagedPolicy;
969
+ /** Enables access to AWS Services and Resources used or managed by Amazon WorkSpaces Thin Client Monitoring */
970
+ AmazonWorkSpacesThinClientMonitoringServiceRolePolicy(): aws_iam.IManagedPolicy;
969
971
  /** Provides read-only access to Amazon WorkSpaces Thin Client and its dependencies */
970
972
  AmazonWorkSpacesThinClientReadOnlyAccess(): aws_iam.IManagedPolicy;
971
973
  /** Provides read-only access to Amazon WorkSpaces Web and its dependencies through the AWS Management Console, SDK, and CLI. */
@@ -1860,6 +1862,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1860
1862
  AWSMigrationHubStrategyServiceRolePolicy(): aws_iam.IManagedPolicy;
1861
1863
  /** Grants permissions to Amazon MSK Replicator to replicate data between MSK Clusters. */
1862
1864
  AWSMSKReplicatorExecutionRole(): aws_iam.IManagedPolicy;
1865
+ /** Grants full access to AWS Network Firewall service, including permissions to create, configure, manage, and delete firewall resources, policies, and rule groups. Additionally includes permissions to modify VPC endpoints, S3 bucket policies, CloudWatch Logs configurations, and create service-linked roles for Network Firewall and log delivery services */
1866
+ AWSNetworkFirewallFullAccess(): aws_iam.IManagedPolicy;
1867
+ /** Provides read-only access to AWS Network Firewall resources via the AWS Management Console, CLI, and SDKs. This policy allows users to view and monitor firewall configurations, policies, rule groups, and associated resources, without the ability to make changes. */
1868
+ AWSNetworkFirewallReadOnlyAccess(): aws_iam.IManagedPolicy;
1863
1869
  /** Allow AWSNetworkFirewall to create and manage necessary resources for your Firewalls. */
1864
1870
  AWSNetworkFirewallServiceRolePolicy(): aws_iam.IManagedPolicy;
1865
1871
  /** Allow NetworkManager to access resources associated with your Core Network */
@@ -2074,6 +2080,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2074
2080
  AWSSecurityHubReadOnlyAccess(): aws_iam.IManagedPolicy;
2075
2081
  /** A service-linked role required for AWS Security Hub to access your resources. */
2076
2082
  AWSSecurityHubServiceRolePolicy(): aws_iam.IManagedPolicy;
2083
+ /** This policy allows Security Hub to manage AWS Config rules and Security Hub resources in your organization and on your behalf. */
2084
+ AWSSecurityHubV2ServiceRolePolicy(): aws_iam.IManagedPolicy;
2077
2085
  /** Policy provides customers with Read and Write permissions to case resources that are created through the Security Incident Response service. */
2078
2086
  AWSSecurityIncidentResponseCaseFullAccess(): aws_iam.IManagedPolicy;
2079
2087
  /** Policy provides customers with Read and Write permissions to all resources associated to the Security Incident Response service. */
@@ -2142,6 +2150,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2142
2150
  AWSServiceRolePolicyForBackupReports(): aws_iam.IManagedPolicy;
2143
2151
  /** This policy contains permissions for testing restores and for cleaning up resources created during tests. */
2144
2152
  AWSServiceRolePolicyForBackupRestoreTesting(): aws_iam.IManagedPolicy;
2153
+ /** This managed policy provides administrative access to Amazon WorkSpaces to manage EC2 instances in your AWS account */
2154
+ AWSServiceRolePolicyForWorkspacesInstances(): aws_iam.IManagedPolicy;
2145
2155
  /** Provides the AWS DDoS Response Team with limited access to your AWS account to assist with DDoS attack mitigation during a high-severity event. */
2146
2156
  AWSShieldDRTAccessPolicy(): aws_iam.IManagedPolicy;
2147
2157
  /** Allows AWS Shield to access AWS resources on your behalf to provide DDoS protection. */
@@ -2554,6 +2564,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2554
2564
  NeptuneReadOnlyAccess(): aws_iam.IManagedPolicy;
2555
2565
  /** Grants full access permissions to AWS services and actions required to set up and configure AWS network resources. */
2556
2566
  NetworkAdministrator(): aws_iam.IManagedPolicy;
2567
+ /** Provides permissions for the AWS Shield network security director service linked role to assess specified environments. */
2568
+ NetworkSecurityDirectorServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
2557
2569
  /** Provides full access to CloudWatch Observability Access Manager */
2558
2570
  OAMFullAccess(): aws_iam.IManagedPolicy;
2559
2571
  /** Provides Read Only access to CloudWatch Observability Access Manager */