iam-floyd 0.658.0 → 0.659.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (352) hide show
  1. package/README.md +4 -4
  2. package/lib/generated/aws-managed-policies/cdk-iam-floyd.d.ts +190 -2
  3. package/lib/generated/aws-managed-policies/cdk-iam-floyd.js +381 -5
  4. package/lib/generated/aws-managed-policies/iam-floyd.d.ts +190 -2
  5. package/lib/generated/aws-managed-policies/iam-floyd.js +191 -3
  6. package/lib/generated/index.d.ts +25 -8
  7. package/lib/generated/index.js +60 -26
  8. package/lib/generated/policy-statements/aioperations.d.ts +328 -0
  9. package/lib/generated/policy-statements/aioperations.js +417 -0
  10. package/lib/generated/policy-statements/amplifyadmin.d.ts +3 -0
  11. package/lib/generated/policy-statements/amplifyadmin.js +4 -1
  12. package/lib/generated/policy-statements/appconfig.d.ts +19 -3
  13. package/lib/generated/policy-statements/appconfig.js +26 -4
  14. package/lib/generated/policy-statements/appintegrations.d.ts +20 -0
  15. package/lib/generated/policy-statements/appintegrations.js +24 -1
  16. package/lib/generated/policy-statements/applicationautoscaling.d.ts +8 -0
  17. package/lib/generated/policy-statements/applicationautoscaling.js +14 -1
  18. package/lib/generated/policy-statements/applicationmigrationservice.d.ts +452 -0
  19. package/lib/generated/policy-statements/applicationmigrationservice.js +527 -1
  20. package/lib/generated/policy-statements/{route53applicationrecoverycontroller-zonalshift.d.ts → applicationrecoverycontroller-zonalshift.d.ts} +35 -2
  21. package/lib/generated/policy-statements/applicationrecoverycontroller-zonalshift.js +336 -0
  22. package/lib/generated/policy-statements/appstream2-0.d.ts +32 -0
  23. package/lib/generated/policy-statements/appstream2-0.js +46 -2
  24. package/lib/generated/policy-statements/appstudio.d.ts +5 -5
  25. package/lib/generated/policy-statements/appstudio.js +6 -6
  26. package/lib/generated/policy-statements/appsync.d.ts +191 -0
  27. package/lib/generated/policy-statements/appsync.js +235 -1
  28. package/lib/generated/policy-statements/artifact.d.ts +50 -2
  29. package/lib/generated/policy-statements/artifact.js +69 -3
  30. package/lib/generated/policy-statements/auroradsql.d.ts +203 -0
  31. package/lib/generated/policy-statements/auroradsql.js +264 -0
  32. package/lib/generated/policy-statements/b2bdatainterchange.d.ts +24 -0
  33. package/lib/generated/policy-statements/b2bdatainterchange.js +34 -1
  34. package/lib/generated/policy-statements/backup.d.ts +55 -0
  35. package/lib/generated/policy-statements/backup.js +74 -2
  36. package/lib/generated/policy-statements/backupsearch.d.ts +203 -0
  37. package/lib/generated/policy-statements/backupsearch.js +264 -0
  38. package/lib/generated/policy-statements/batch.d.ts +14 -10
  39. package/lib/generated/policy-statements/batch.js +17 -11
  40. package/lib/generated/policy-statements/bedrock.d.ts +631 -0
  41. package/lib/generated/policy-statements/bedrock.js +831 -2
  42. package/lib/generated/policy-statements/billing.d.ts +194 -3
  43. package/lib/generated/policy-statements/billing.js +247 -9
  44. package/lib/generated/policy-statements/billingandcostmanagementpricingcalculator.d.ts +381 -0
  45. package/lib/generated/policy-statements/billingandcostmanagementpricingcalculator.js +516 -0
  46. package/lib/generated/policy-statements/chatbot.d.ts +105 -31
  47. package/lib/generated/policy-statements/chatbot.js +134 -32
  48. package/lib/generated/policy-statements/chime.d.ts +79 -1
  49. package/lib/generated/policy-statements/chime.js +101 -2
  50. package/lib/generated/policy-statements/cleanrooms.d.ts +17 -0
  51. package/lib/generated/policy-statements/cleanrooms.js +24 -1
  52. package/lib/generated/policy-statements/cleanroomsml.d.ts +548 -9
  53. package/lib/generated/policy-statements/cleanroomsml.js +658 -10
  54. package/lib/generated/policy-statements/clouddirectory.d.ts +1 -1
  55. package/lib/generated/policy-statements/clouddirectory.js +2 -2
  56. package/lib/generated/policy-statements/cloudformation.d.ts +27 -0
  57. package/lib/generated/policy-statements/cloudformation.js +33 -1
  58. package/lib/generated/policy-statements/cloudfront.d.ts +137 -1
  59. package/lib/generated/policy-statements/cloudfront.js +182 -4
  60. package/lib/generated/policy-statements/cloudhsm.d.ts +0 -144
  61. package/lib/generated/policy-statements/cloudhsm.js +5 -205
  62. package/lib/generated/policy-statements/cloudmap.d.ts +24 -0
  63. package/lib/generated/policy-statements/cloudmap.js +35 -2
  64. package/lib/generated/policy-statements/cloudtrail.d.ts +97 -3
  65. package/lib/generated/policy-statements/cloudtrail.js +121 -4
  66. package/lib/generated/policy-statements/cloudwatch.d.ts +8 -0
  67. package/lib/generated/policy-statements/cloudwatch.js +12 -1
  68. package/lib/generated/policy-statements/cloudwatchapplicationsignals.d.ts +8 -0
  69. package/lib/generated/policy-statements/cloudwatchapplicationsignals.js +12 -1
  70. package/lib/generated/policy-statements/cloudwatchinternetmonitor.d.ts +4 -0
  71. package/lib/generated/policy-statements/cloudwatchinternetmonitor.js +5 -1
  72. package/lib/generated/policy-statements/cloudwatchlogs.d.ts +142 -0
  73. package/lib/generated/policy-statements/cloudwatchlogs.js +194 -1
  74. package/lib/generated/policy-statements/cloudwatchobservabilityadminservice.d.ts +81 -0
  75. package/lib/generated/policy-statements/cloudwatchobservabilityadminservice.js +116 -0
  76. package/lib/generated/policy-statements/codeconnections.d.ts +8 -0
  77. package/lib/generated/policy-statements/codeconnections.js +12 -1
  78. package/lib/generated/policy-statements/codepipeline.d.ts +24 -0
  79. package/lib/generated/policy-statements/codepipeline.js +34 -1
  80. package/lib/generated/policy-statements/codestarconnections.d.ts +8 -0
  81. package/lib/generated/policy-statements/codestarconnections.js +12 -1
  82. package/lib/generated/policy-statements/codewhisperer.d.ts +4 -2
  83. package/lib/generated/policy-statements/codewhisperer.js +7 -5
  84. package/lib/generated/policy-statements/cognitouserpools.d.ts +40 -0
  85. package/lib/generated/policy-statements/cognitouserpools.js +56 -1
  86. package/lib/generated/policy-statements/computeoptimizer.d.ts +19 -0
  87. package/lib/generated/policy-statements/computeoptimizer.js +26 -1
  88. package/lib/generated/policy-statements/config.d.ts +105 -5
  89. package/lib/generated/policy-statements/config.js +163 -44
  90. package/lib/generated/policy-statements/connect.d.ts +307 -4
  91. package/lib/generated/policy-statements/connect.js +374 -5
  92. package/lib/generated/policy-statements/connectcustomerprofiles.d.ts +180 -0
  93. package/lib/generated/policy-statements/connectcustomerprofiles.js +239 -1
  94. package/lib/generated/policy-statements/{high-volumeoutboundcommunications.d.ts → connectoutboundcampaigns.d.ts} +140 -30
  95. package/lib/generated/policy-statements/connectoutboundcampaigns.js +524 -0
  96. package/lib/generated/policy-statements/controlcatalog.d.ts +25 -0
  97. package/lib/generated/policy-statements/controlcatalog.js +36 -1
  98. package/lib/generated/policy-statements/controltower.d.ts +8 -0
  99. package/lib/generated/policy-statements/controltower.js +12 -1
  100. package/lib/generated/policy-statements/costexplorerservice.d.ts +66 -0
  101. package/lib/generated/policy-statements/costexplorerservice.js +78 -1
  102. package/lib/generated/policy-statements/databasemigrationservice.d.ts +37 -1
  103. package/lib/generated/policy-statements/databasemigrationservice.js +42 -2
  104. package/lib/generated/policy-statements/dataexchange.d.ts +90 -1
  105. package/lib/generated/policy-statements/dataexchange.js +117 -2
  106. package/lib/generated/policy-statements/datazone.d.ts +222 -0
  107. package/lib/generated/policy-statements/datazone.js +334 -1
  108. package/lib/generated/policy-statements/deadlinecloud.d.ts +17 -0
  109. package/lib/generated/policy-statements/deadlinecloud.js +24 -1
  110. package/lib/generated/policy-statements/deepracer.d.ts +31 -3
  111. package/lib/generated/policy-statements/deepracer.js +38 -4
  112. package/lib/generated/policy-statements/directoryservice.d.ts +32 -0
  113. package/lib/generated/policy-statements/directoryservice.js +47 -1
  114. package/lib/generated/policy-statements/directoryservicedata.d.ts +420 -0
  115. package/lib/generated/policy-statements/directoryservicedata.js +498 -0
  116. package/lib/generated/policy-statements/documentdbelasticclusters.d.ts +36 -0
  117. package/lib/generated/policy-statements/documentdbelasticclusters.js +47 -2
  118. package/lib/generated/policy-statements/dynamodb.d.ts +75 -0
  119. package/lib/generated/policy-statements/dynamodb.js +89 -2
  120. package/lib/generated/policy-statements/ec2.d.ts +1163 -7
  121. package/lib/generated/policy-statements/ec2.js +1340 -19
  122. package/lib/generated/policy-statements/ec2autoscaling.d.ts +30 -0
  123. package/lib/generated/policy-statements/ec2autoscaling.js +35 -1
  124. package/lib/generated/policy-statements/ec2imagebuilder.d.ts +8 -0
  125. package/lib/generated/policy-statements/ec2imagebuilder.js +12 -1
  126. package/lib/generated/policy-statements/elasticache.d.ts +35 -1
  127. package/lib/generated/policy-statements/elasticache.js +40 -2
  128. package/lib/generated/policy-statements/elasticbeanstalk.d.ts +1 -1
  129. package/lib/generated/policy-statements/elasticbeanstalk.js +2 -2
  130. package/lib/generated/policy-statements/elasticcontainerregistry.d.ts +35 -0
  131. package/lib/generated/policy-statements/elasticcontainerregistry.js +44 -1
  132. package/lib/generated/policy-statements/elasticcontainerservice.d.ts +93 -0
  133. package/lib/generated/policy-statements/elasticcontainerservice.js +109 -1
  134. package/lib/generated/policy-statements/elasticfilesystem.d.ts +18 -2
  135. package/lib/generated/policy-statements/elasticfilesystem.js +26 -4
  136. package/lib/generated/policy-statements/elastickubernetesservice.d.ts +50 -0
  137. package/lib/generated/policy-statements/elastickubernetesservice.js +60 -1
  138. package/lib/generated/policy-statements/elasticloadbalancingv2.d.ts +44 -0
  139. package/lib/generated/policy-statements/elasticloadbalancingv2.js +57 -1
  140. package/lib/generated/policy-statements/elementalappliancesandsoftware.d.ts +2 -81
  141. package/lib/generated/policy-statements/elementalappliancesandsoftware.js +4 -100
  142. package/lib/generated/policy-statements/elementalappliancesandsoftwareactivationservice.d.ts +37 -79
  143. package/lib/generated/policy-statements/elementalappliancesandsoftwareactivationservice.js +58 -99
  144. package/lib/generated/policy-statements/elementalmediaconnect.d.ts +8 -0
  145. package/lib/generated/policy-statements/elementalmediaconnect.js +12 -1
  146. package/lib/generated/policy-statements/elementalmediaconvert.d.ts +8 -0
  147. package/lib/generated/policy-statements/elementalmediaconvert.js +12 -1
  148. package/lib/generated/policy-statements/elementalmedialive.d.ts +311 -3
  149. package/lib/generated/policy-statements/elementalmedialive.js +392 -4
  150. package/lib/generated/policy-statements/elementalmediapackagev2.d.ts +89 -0
  151. package/lib/generated/policy-statements/elementalmediapackagev2.js +111 -1
  152. package/lib/generated/policy-statements/elementalsupportcases.d.ts +162 -1
  153. package/lib/generated/policy-statements/elementalsupportcases.js +210 -3
  154. package/lib/generated/policy-statements/{pinpointsmsvoicev2.d.ts → endusermessagingsmsandvoicev2.d.ts} +77 -2
  155. package/lib/generated/policy-statements/endusermessagingsmsandvoicev2.js +1338 -0
  156. package/lib/generated/policy-statements/endusermessagingsocial.d.ts +210 -0
  157. package/lib/generated/policy-statements/endusermessagingsocial.js +274 -0
  158. package/lib/generated/policy-statements/eventbridge.d.ts +40 -6
  159. package/lib/generated/policy-statements/eventbridge.js +49 -7
  160. package/lib/generated/policy-statements/faultinjectionservice.d.ts +27 -0
  161. package/lib/generated/policy-statements/faultinjectionservice.js +36 -1
  162. package/lib/generated/policy-statements/frauddetector.d.ts +2 -2
  163. package/lib/generated/policy-statements/frauddetector.js +3 -3
  164. package/lib/generated/policy-statements/gamelift.d.ts +125 -11
  165. package/lib/generated/policy-statements/gamelift.js +158 -12
  166. package/lib/generated/policy-statements/glue.d.ts +355 -27
  167. package/lib/generated/policy-statements/glue.js +471 -38
  168. package/lib/generated/policy-statements/healthlake.d.ts +26 -2
  169. package/lib/generated/policy-statements/healthlake.js +38 -5
  170. package/lib/generated/policy-statements/healthomics.d.ts +121 -95
  171. package/lib/generated/policy-statements/healthomics.js +153 -112
  172. package/lib/generated/policy-statements/iamaccessanalyzer.d.ts +8 -0
  173. package/lib/generated/policy-statements/iamaccessanalyzer.js +12 -1
  174. package/lib/generated/policy-statements/iamidentitycentersuccessortoawssinglesign-ondirectory.d.ts +48 -16
  175. package/lib/generated/policy-statements/iamidentitycentersuccessortoawssinglesign-ondirectory.js +61 -17
  176. package/lib/generated/policy-statements/identityandaccessmanagementiam.d.ts +40 -0
  177. package/lib/generated/policy-statements/identityandaccessmanagementiam.js +56 -1
  178. package/lib/generated/policy-statements/identitystore.d.ts +8 -8
  179. package/lib/generated/policy-statements/identitystore.js +9 -9
  180. package/lib/generated/policy-statements/identitysync.d.ts +14 -14
  181. package/lib/generated/policy-statements/identitysync.js +15 -15
  182. package/lib/generated/policy-statements/interactivevideoservice.d.ts +61 -0
  183. package/lib/generated/policy-statements/interactivevideoservice.js +79 -1
  184. package/lib/generated/policy-statements/invoicingservice.d.ts +160 -5
  185. package/lib/generated/policy-statements/invoicingservice.js +201 -7
  186. package/lib/generated/policy-statements/iot.d.ts +181 -0
  187. package/lib/generated/policy-statements/iot.js +232 -1
  188. package/lib/generated/policy-statements/iotfleetwise.d.ts +84 -0
  189. package/lib/generated/policy-statements/iotfleetwise.js +109 -1
  190. package/lib/generated/policy-statements/iotsitewise.d.ts +69 -0
  191. package/lib/generated/policy-statements/iotsitewise.js +90 -1
  192. package/lib/generated/policy-statements/keyspacesforapachecassandra.d.ts +0 -16
  193. package/lib/generated/policy-statements/keyspacesforapachecassandra.js +1 -17
  194. package/lib/generated/policy-statements/kinesisanalyticsv2.d.ts +16 -0
  195. package/lib/generated/policy-statements/kinesisanalyticsv2.js +23 -1
  196. package/lib/generated/policy-statements/kinesisdatastreams.d.ts +70 -1
  197. package/lib/generated/policy-statements/kinesisdatastreams.js +76 -1
  198. package/lib/generated/policy-statements/kinesisfirehose.d.ts +3 -3
  199. package/lib/generated/policy-statements/kinesisfirehose.js +4 -4
  200. package/lib/generated/policy-statements/kinesisvideostreams.d.ts +11 -3
  201. package/lib/generated/policy-statements/kinesisvideostreams.js +15 -4
  202. package/lib/generated/policy-statements/lakeformation.d.ts +40 -0
  203. package/lib/generated/policy-statements/lakeformation.js +56 -1
  204. package/lib/generated/policy-statements/lambda.d.ts +37 -3
  205. package/lib/generated/policy-statements/lambda.js +44 -4
  206. package/lib/generated/policy-statements/licensemanagerusersubscriptions.d.ts +174 -1
  207. package/lib/generated/policy-statements/licensemanagerusersubscriptions.js +210 -1
  208. package/lib/generated/policy-statements/locationservicemaps.d.ts +42 -0
  209. package/lib/generated/policy-statements/locationservicemaps.js +59 -0
  210. package/lib/generated/policy-statements/locationserviceplaces.d.ts +82 -0
  211. package/lib/generated/policy-statements/locationserviceplaces.js +114 -0
  212. package/lib/generated/policy-statements/locationserviceroutes.d.ts +66 -0
  213. package/lib/generated/policy-statements/locationserviceroutes.js +92 -0
  214. package/lib/generated/policy-statements/{mainframemodernizationapplicationtestingprovidestoolsandresourcesforautomatedfunctionalequivalencetestingforyourmigrationprojects-.d.ts → mainframemodernizationapplicationtesting.d.ts} +7 -6
  215. package/lib/generated/policy-statements/mainframemodernizationapplicationtesting.js +468 -0
  216. package/lib/generated/policy-statements/managedserviceforprometheus.d.ts +16 -0
  217. package/lib/generated/policy-statements/managedserviceforprometheus.js +20 -1
  218. package/lib/generated/policy-statements/managedworkflowsforapacheairflow.d.ts +8 -0
  219. package/lib/generated/policy-statements/managedworkflowsforapacheairflow.js +12 -1
  220. package/lib/generated/policy-statements/marketplace.d.ts +16 -0
  221. package/lib/generated/policy-statements/marketplace.js +24 -2
  222. package/lib/generated/policy-statements/marketplacereporting.d.ts +37 -0
  223. package/lib/generated/policy-statements/marketplacereporting.js +51 -0
  224. package/lib/generated/policy-statements/memorydb.d.ts +120 -0
  225. package/lib/generated/policy-statements/memorydb.js +146 -1
  226. package/lib/generated/policy-statements/migrationhub.d.ts +332 -1
  227. package/lib/generated/policy-statements/migrationhub.js +429 -3
  228. package/lib/generated/policy-statements/neptuneanalytics.d.ts +62 -0
  229. package/lib/generated/policy-statements/neptuneanalytics.js +77 -1
  230. package/lib/generated/policy-statements/networkflowmonitor.d.ts +312 -0
  231. package/lib/generated/policy-statements/networkflowmonitor.js +415 -0
  232. package/lib/generated/policy-statements/networkmanager.d.ts +71 -0
  233. package/lib/generated/policy-statements/networkmanager.js +85 -1
  234. package/lib/generated/policy-statements/opensearch.d.ts +79 -0
  235. package/lib/generated/policy-statements/opensearch.js +109 -0
  236. package/lib/generated/policy-statements/opensearchserverless.d.ts +18 -0
  237. package/lib/generated/policy-statements/opensearchserverless.js +19 -1
  238. package/lib/generated/policy-statements/opensearchservice.d.ts +149 -3
  239. package/lib/generated/policy-statements/opensearchservice.js +193 -4
  240. package/lib/generated/policy-statements/outposts.d.ts +22 -6
  241. package/lib/generated/policy-statements/outposts.js +29 -7
  242. package/lib/generated/policy-statements/parallelcomputingservice.d.ts +348 -0
  243. package/lib/generated/policy-statements/parallelcomputingservice.js +432 -0
  244. package/lib/generated/policy-statements/partnercentralselling.d.ts +555 -0
  245. package/lib/generated/policy-statements/partnercentralselling.js +693 -0
  246. package/lib/generated/policy-statements/paymentcryptography.d.ts +8 -0
  247. package/lib/generated/policy-statements/paymentcryptography.js +12 -1
  248. package/lib/generated/policy-statements/payments.d.ts +96 -0
  249. package/lib/generated/policy-statements/payments.js +136 -4
  250. package/lib/generated/policy-statements/personalize.d.ts +11 -9
  251. package/lib/generated/policy-statements/personalize.js +19 -14
  252. package/lib/generated/policy-statements/privatelink.d.ts +25 -0
  253. package/lib/generated/policy-statements/privatelink.js +37 -0
  254. package/lib/generated/policy-statements/q.d.ts +230 -13
  255. package/lib/generated/policy-statements/q.js +282 -14
  256. package/lib/generated/policy-statements/qbusiness.d.ts +212 -0
  257. package/lib/generated/policy-statements/qbusiness.js +293 -2
  258. package/lib/generated/policy-statements/qbusinessqapps.d.ts +155 -49
  259. package/lib/generated/policy-statements/qbusinessqapps.js +186 -50
  260. package/lib/generated/policy-statements/qinconnect.d.ts +507 -0
  261. package/lib/generated/policy-statements/qinconnect.js +658 -2
  262. package/lib/generated/policy-statements/quicksight.d.ts +305 -15
  263. package/lib/generated/policy-statements/quicksight.js +413 -34
  264. package/lib/generated/policy-statements/rds.d.ts +45 -9
  265. package/lib/generated/policy-statements/rds.js +52 -13
  266. package/lib/generated/policy-statements/redshift.d.ts +172 -3
  267. package/lib/generated/policy-statements/redshift.js +205 -6
  268. package/lib/generated/policy-statements/redshiftdataapi.d.ts +53 -0
  269. package/lib/generated/policy-statements/redshiftdataapi.js +63 -1
  270. package/lib/generated/policy-statements/redshiftserverless.d.ts +84 -0
  271. package/lib/generated/policy-statements/redshiftserverless.js +95 -1
  272. package/lib/generated/policy-statements/rekognition.d.ts +20 -0
  273. package/lib/generated/policy-statements/rekognition.js +21 -1
  274. package/lib/generated/policy-statements/{re-postprivate.d.ts → repostprivate.d.ts} +20 -4
  275. package/lib/generated/policy-statements/repostprivate.js +251 -0
  276. package/lib/generated/policy-statements/resiliencehub.d.ts +24 -0
  277. package/lib/generated/policy-statements/resiliencehub.js +34 -1
  278. package/lib/generated/policy-statements/resourceaccessmanagerram.d.ts +1 -1
  279. package/lib/generated/policy-statements/resourceaccessmanagerram.js +2 -2
  280. package/lib/generated/policy-statements/resourceexplorer.d.ts +51 -0
  281. package/lib/generated/policy-statements/resourceexplorer.js +65 -1
  282. package/lib/generated/policy-statements/resourcegroups.d.ts +74 -0
  283. package/lib/generated/policy-statements/resourcegroups.js +92 -1
  284. package/lib/generated/policy-statements/route53.d.ts +38 -3
  285. package/lib/generated/policy-statements/route53.js +41 -4
  286. package/lib/generated/policy-statements/{route53profilesenablessharingdnssettingswithvpcs.d.ts → route53profiles.d.ts} +19 -3
  287. package/lib/generated/policy-statements/route53profiles.js +330 -0
  288. package/lib/generated/policy-statements/s3.d.ts +145 -5
  289. package/lib/generated/policy-statements/s3.js +164 -6
  290. package/lib/generated/policy-statements/s3express.d.ts +114 -1
  291. package/lib/generated/policy-statements/s3express.js +135 -4
  292. package/lib/generated/policy-statements/s3tables.d.ts +388 -0
  293. package/lib/generated/policy-statements/s3tables.js +495 -0
  294. package/lib/generated/policy-statements/sagemaker.d.ts +345 -1
  295. package/lib/generated/policy-statements/sagemaker.js +426 -3
  296. package/lib/generated/policy-statements/sagemakerdatascienceassistant.d.ts +25 -0
  297. package/lib/generated/policy-statements/sagemakerdatascienceassistant.js +37 -0
  298. package/lib/generated/policy-statements/sagemakerwithmlflow.d.ts +73 -1
  299. package/lib/generated/policy-statements/sagemakerwithmlflow.js +99 -2
  300. package/lib/generated/policy-statements/securityincidentresponse.d.ts +300 -0
  301. package/lib/generated/policy-statements/securityincidentresponse.js +391 -0
  302. package/lib/generated/policy-statements/securitylake.d.ts +1 -1
  303. package/lib/generated/policy-statements/securitylake.js +2 -2
  304. package/lib/generated/policy-statements/securitytokenservice.d.ts +32 -0
  305. package/lib/generated/policy-statements/securitytokenservice.js +40 -1
  306. package/lib/generated/policy-statements/servicecatalog.d.ts +24 -2
  307. package/lib/generated/policy-statements/servicecatalog.js +34 -3
  308. package/lib/generated/policy-statements/simpleemailservice-mailmanager.d.ts +8 -0
  309. package/lib/generated/policy-statements/simpleemailservice-mailmanager.js +14 -1
  310. package/lib/generated/policy-statements/simpleemailservicev2.d.ts +106 -0
  311. package/lib/generated/policy-statements/simpleemailservicev2.js +129 -2
  312. package/lib/generated/policy-statements/sqlworkbench.d.ts +72 -0
  313. package/lib/generated/policy-statements/sqlworkbench.js +100 -1
  314. package/lib/generated/policy-statements/supplychain.d.ts +116 -3
  315. package/lib/generated/policy-statements/supplychain.js +155 -5
  316. package/lib/generated/policy-statements/supportplans.d.ts +8 -0
  317. package/lib/generated/policy-statements/supportplans.js +14 -1
  318. package/lib/generated/policy-statements/systemsmanager.d.ts +62 -11
  319. package/lib/generated/policy-statements/systemsmanager.js +83 -15
  320. package/lib/generated/policy-statements/systemsmanagerguiconnect.d.ts +11 -3
  321. package/lib/generated/policy-statements/systemsmanagerguiconnect.js +17 -4
  322. package/lib/generated/policy-statements/systemsmanagerquicksetup.d.ts +19 -2
  323. package/lib/generated/policy-statements/systemsmanagerquicksetup.js +28 -5
  324. package/lib/generated/policy-statements/taxsettings.d.ts +24 -0
  325. package/lib/generated/policy-statements/taxsettings.js +34 -1
  326. package/lib/generated/policy-statements/transferfamily.d.ts +102 -0
  327. package/lib/generated/policy-statements/transferfamily.js +133 -2
  328. package/lib/generated/policy-statements/vpclattice.d.ts +429 -94
  329. package/lib/generated/policy-statements/vpclattice.js +511 -107
  330. package/lib/generated/policy-statements/wickr.d.ts +8 -0
  331. package/lib/generated/policy-statements/wickr.js +12 -1
  332. package/lib/generated/policy-statements/workmail.d.ts +64 -0
  333. package/lib/generated/policy-statements/workmail.js +89 -1
  334. package/lib/generated/policy-statements/workspaces.d.ts +1 -1
  335. package/lib/generated/policy-statements/workspaces.js +2 -2
  336. package/lib/generated/policy-statements/workspacessecurebrowser.d.ts +24 -0
  337. package/lib/generated/policy-statements/workspacessecurebrowser.js +34 -1
  338. package/lib/generated/policy-statements/workspacesthinclient.d.ts +69 -1
  339. package/lib/generated/policy-statements/workspacesthinclient.js +73 -2
  340. package/lib/generated/policy-statements/x-ray.d.ts +72 -0
  341. package/lib/generated/policy-statements/x-ray.js +105 -3
  342. package/package.json +9 -9
  343. package/lib/generated/policy-statements/high-volumeoutboundcommunications.js +0 -372
  344. package/lib/generated/policy-statements/iot1-click.d.ts +0 -312
  345. package/lib/generated/policy-statements/iot1-click.js +0 -415
  346. package/lib/generated/policy-statements/iotroborunner.d.ts +0 -288
  347. package/lib/generated/policy-statements/iotroborunner.js +0 -375
  348. package/lib/generated/policy-statements/mainframemodernizationapplicationtestingprovidestoolsandresourcesforautomatedfunctionalequivalencetestingforyourmigrationprojects-.js +0 -467
  349. package/lib/generated/policy-statements/pinpointsmsvoicev2.js +0 -1235
  350. package/lib/generated/policy-statements/re-postprivate.js +0 -229
  351. package/lib/generated/policy-statements/route53applicationrecoverycontroller-zonalshift.js +0 -301
  352. package/lib/generated/policy-statements/route53profilesenablessharingdnssettingswithvpcs.js +0 -308
package/README.md CHANGED
@@ -16,10 +16,10 @@
16
16
  <!-- stats -->
17
17
  Support for:
18
18
 
19
- - 401 Services
20
- - 17042 Actions
21
- - 1823 Resource Types
22
- - 1782 Condition keys
19
+ - 417 Services
20
+ - 18171 Actions
21
+ - 1947 Resource Types
22
+ - 1896 Condition keys
23
23
  <!-- /stats -->
24
24
 
25
25
  ![EXPERIMENTAL](https://img.shields.io/badge/stability-experimantal-orange?style=for-the-badge)**<br>This is an early version of the package. The API will change while I implement new features. Therefore make sure you use an exact version in your `package.json` before it reaches 1.0.0.**
@@ -16,6 +16,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
16
16
  AdministratorAccessAmplify(): aws_iam.IManagedPolicy;
17
17
  /** Grants account administrative permissions. Explicitly allows developers and administrators to gain direct access to resources they need to manage AWS Elastic Beanstalk applications */
18
18
  AdministratorAccessAWSElasticBeanstalk(): aws_iam.IManagedPolicy;
19
+ /** Provides ReadOnly permissions required by the Amazon AI Operations Assistant to do analysis on customer AWS resources during investigations. */
20
+ AIOpsAssistantPolicy(): aws_iam.IManagedPolicy;
21
+ /** Grants full access to Amazon AI Operations service and its required permissions via AWS console. It also includes permissions to use identity-aware console sessions. */
22
+ AIOpsConsoleAdminPolicy(): aws_iam.IManagedPolicy;
23
+ /** Grants access to the Amazon AI Operations APIs for creating, updating, and deleting investigations, investigation events, and investigation resources. It also includes ReadOnly access to all AI Operations APIs and to use identity-aware sessions. */
24
+ AIOpsOperatorAccess(): aws_iam.IManagedPolicy;
25
+ /** Grants ReadOnly permissions to the Amazon AI Operations service and its required resources. */
26
+ AIOpsReadOnlyAccess(): aws_iam.IManagedPolicy;
19
27
  /** Provide device setup access to AlexaForBusiness services */
20
28
  AlexaForBusinessDeviceSetup(): aws_iam.IManagedPolicy;
21
29
  /** Grants full access to AlexaForBusiness resources and access to related AWS Services */
@@ -56,6 +64,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
56
64
  AmazonAugmentedAIHumanLoopFullAccess(): aws_iam.IManagedPolicy;
57
65
  /** Provides access to perform all operations Amazon Augmented AI resources, including FlowDefinitions, HumanTaskUis and HumanLoops. Also provides access to those operations of services that are integrated with Amazon Augmented AI. */
58
66
  AmazonAugmentedAIIntegratedAPIAccess(): aws_iam.IManagedPolicy;
67
+ /** Provides console full administrative access to Aurora DSQL */
68
+ AmazonAuroraDSQLConsoleFullAccess(): aws_iam.IManagedPolicy;
69
+ /** Provides full administrative access to Aurora DSQL */
70
+ AmazonAuroraDSQLFullAccess(): aws_iam.IManagedPolicy;
71
+ /** Provides read only access to Aurora DSQL */
72
+ AmazonAuroraDSQLReadOnlyAccess(): aws_iam.IManagedPolicy;
59
73
  /** Provides full access to Amazon Bedrock as well as limited access to related services that are required by it */
60
74
  AmazonBedrockFullAccess(): aws_iam.IManagedPolicy;
61
75
  /** Provides read only access to Amazon Bedrock */
@@ -150,6 +164,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
150
164
  AmazonConnectSynchronizationServiceRolePolicy(): aws_iam.IManagedPolicy;
151
165
  /** Provides full access to Amazon Connect Voice ID */
152
166
  AmazonConnectVoiceIDFullAccess(): aws_iam.IManagedPolicy;
167
+ /** Provides permissions to consume Amazon Bedrock models, including invoking Amazon Bedrock application inference profile created for particular Amazon DataZone domain. */
168
+ AmazonDataZoneBedrockModelConsumptionPolicy(): aws_iam.IManagedPolicy;
169
+ /** Provides permissions to manage Amazon Bedrock model access, including creating, tagging and deleting application inference profiles. */
170
+ AmazonDataZoneBedrockModelManagementPolicy(): aws_iam.IManagedPolicy;
153
171
  /** Default policy for the Amazon DataZone's DomainExecutionRole service role. This role is used by Amazon DataZone to catalog, discover, govern, share, and analyze data in the Amazon DataZone domain. */
154
172
  AmazonDataZoneDomainExecutionRolePolicy(): aws_iam.IManagedPolicy;
155
173
  /** Amazon DataZone creates IAM roles for Environments to perform data analytics actions, and uses this policy when creating these roles to define the boundary of their permissions. */
@@ -222,6 +240,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
222
240
  AmazonEC2ContainerRegistryFullAccess(): aws_iam.IManagedPolicy;
223
241
  /** Provides full access to Amazon EC2 Container Registry repositories, but does not allow repository deletion or policy changes. */
224
242
  AmazonEC2ContainerRegistryPowerUser(): aws_iam.IManagedPolicy;
243
+ /** Provides access to pull images from Amazon EC2 Container Registry repositories. */
244
+ AmazonEC2ContainerRegistryPullOnly(): aws_iam.IManagedPolicy;
225
245
  /** Provides read-only access to Amazon EC2 Container Registry repositories. */
226
246
  AmazonEC2ContainerRegistryReadOnly(): aws_iam.IManagedPolicy;
227
247
  /** Policy to enable Task Autoscaling for Amazon EC2 Container Service */
@@ -256,6 +276,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
256
276
  AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity(): aws_iam.IManagedPolicy;
257
277
  /** Provides access to other AWS service resources required to manage volumes associated with ECS workloads on your behalf. */
258
278
  AmazonECSInfrastructureRolePolicyForVolumes(): aws_iam.IManagedPolicy;
279
+ /** Provides access to other AWS service resources required to manage VPC Lattice feature in ECS workloads on your behalf. */
280
+ AmazonECSInfrastructureRolePolicyForVpcLattice(): aws_iam.IManagedPolicy;
259
281
  /** Policy to enable Amazon ECS to manage your cluster. */
260
282
  AmazonECSServiceRolePolicy(): aws_iam.IManagedPolicy;
261
283
  /** Provides access to other AWS service resources that are required to run Amazon ECS tasks */
@@ -264,18 +286,26 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
264
286
  AmazonEFSCSIDriverPolicy(): aws_iam.IManagedPolicy;
265
287
  /** This policy provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IP address configuration on your EKS worker nodes. This permission set allows the CNI to list, describe, and modify Elastic Network Interfaces on your behalf. More information on the AWS VPC CNI Plugin is available here: https://github.com/aws/amazon-vpc-cni-k8s */
266
288
  AmazonEKSCNIPolicy(): aws_iam.IManagedPolicy;
289
+ /** Policy attached to the EKS Cluster Role that grants permissions to manage the cluster's block storage resources. */
290
+ AmazonEKSBlockStoragePolicy(): aws_iam.IManagedPolicy;
267
291
  /** This policy provides Kubernetes the permissions it requires to manage resources on your behalf. Kubernetes requires Ec2:CreateTags permissions to place identifying information on EC2 resources including but not limited to Instances, Security Groups, and Elastic Network Interfaces. */
268
292
  AmazonEKSClusterPolicy(): aws_iam.IManagedPolicy;
293
+ /** Policy attached to the EKS Cluster Role that grants permissions to manage the cluster's compute resources. */
294
+ AmazonEKSComputePolicy(): aws_iam.IManagedPolicy;
269
295
  /** This policy allows Amazon EKS to manage AWS resources for EKS connector */
270
296
  AmazonEKSConnectorServiceRolePolicy(): aws_iam.IManagedPolicy;
271
297
  /** Provides access to other AWS service resources that are required to run Amazon EKS pods on AWS Fargate */
272
298
  AmazonEKSFargatePodExecutionRolePolicy(): aws_iam.IManagedPolicy;
273
299
  /** This policy grants necessary permissions to Amazon EKS to run fargate tasks */
274
300
  AmazonEKSForFargateServiceRolePolicy(): aws_iam.IManagedPolicy;
301
+ /** Policy attached to the EKS Cluster Role that grants permissions to manage the cluster's load balancing resources. */
302
+ AmazonEKSLoadBalancingPolicy(): aws_iam.IManagedPolicy;
275
303
  /** This policy provides permissions to EKS local cluster's control-plane instances running in your account to manage resources on your behalf. */
276
304
  AmazonEKSLocalOutpostClusterPolicy(): aws_iam.IManagedPolicy;
277
305
  /** Allows Amazon EKS Local to call AWS services on your behalf. */
278
306
  AmazonEKSLocalOutpostServiceRolePolicy(): aws_iam.IManagedPolicy;
307
+ /** Policy attached to the EKS Cluster Role that grants permissions to manage the cluster's networking resources. */
308
+ AmazonEKSNetworkingPolicy(): aws_iam.IManagedPolicy;
279
309
  /** This policy allows Amazon Elastic Container Service for Kubernetes to create and manage the necessary resources to operate EKS Clusters. */
280
310
  AmazonEKSServicePolicy(): aws_iam.IManagedPolicy;
281
311
  /** A Service-Linked Role required for Amazon EKS to call AWS services on your behalf. */
@@ -283,6 +313,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
283
313
  /** Policy used by VPC Resource Controller to manage ENI and IPs for worker nodes. */
284
314
  AmazonEKSVPCResourceController(): aws_iam.IManagedPolicy;
285
315
  /** This policy allows Amazon EKS worker nodes to connect to Amazon EKS Clusters. */
316
+ AmazonEKSWorkerNodeMinimalPolicy(): aws_iam.IManagedPolicy;
317
+ /** This policy allows Amazon EKS worker nodes to connect to Amazon EKS Clusters. */
286
318
  AmazonEKSWorkerNodePolicy(): aws_iam.IManagedPolicy;
287
319
  /** Provides full access to Amazon ElastiCache via the AWS Management Console. */
288
320
  AmazonElastiCacheFullAccess(): aws_iam.IManagedPolicy;
@@ -580,6 +612,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
580
612
  AmazonNimbleStudioStudioAdmin(): aws_iam.IManagedPolicy;
581
613
  /** This policy grants access to Amazon Nimble Studio resources associated with the studio user and related studio resources in other services. Attach this policy to the User role associated with your studio. */
582
614
  AmazonNimbleStudioStudioUser(): aws_iam.IManagedPolicy;
615
+ /** Allows Oracle Database@AWS to manage AWS resources on your behalf. */
616
+ AmazonODBServiceRolePolicy(): aws_iam.IManagedPolicy;
583
617
  /** Provides full access to Amazon Omics and other required AWS Services. This policy allows the user to view and accept RAM share invitations to access resources outside of the user's AWS account. */
584
618
  AmazonOmicsFullAccess(): aws_iam.IManagedPolicy;
585
619
  /** Provide read only access to Amazon Omics */
@@ -734,6 +768,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
734
768
  AmazonS3OutpostsReadOnlyAccess(): aws_iam.IManagedPolicy;
735
769
  /** Provides read only access to all buckets via the AWS Management Console. */
736
770
  AmazonS3ReadOnlyAccess(): aws_iam.IManagedPolicy;
771
+ /** Provides full access to all S3 table buckets. */
772
+ AmazonS3TablesFullAccess(): aws_iam.IManagedPolicy;
773
+ /** Provides read only access to all S3 table buckets. */
774
+ AmazonS3TablesReadOnlyAccess(): aws_iam.IManagedPolicy;
737
775
  /** Service role policy used by the AWS Service Catalog service to provision products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including CodePipeline, CodeBuild, CodeCommit, Glue, CloudFormation, etc,. */
738
776
  AmazonSageMakerAdminServiceCatalogProductsServiceRolePolicy(): aws_iam.IManagedPolicy;
739
777
  /** Provides permissions for Amazon SageMaker Canvas to use AI services to support ready to use AI solutions. This policy will add more mutating permissions for services as Amazon SageMaker Canvas adds support. */
@@ -750,6 +788,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
750
788
  AmazonSageMakerCanvasForecastAccess(): aws_iam.IManagedPolicy;
751
789
  /** Provides full access to Amazon SageMaker Canvas resources and operations. The policy also provides select access to related services (e.g., S3, IAM, VPC, ECR, CloudWatch Logs, Redshift, Secrets Manager, and Forecast). This policy should be attached to the Amazon SageMaker Domain/User Profile execution role. */
752
790
  AmazonSageMakerCanvasFullAccess(): aws_iam.IManagedPolicy;
791
+ /** Provides permissions for Amazon SageMaker Canvas to use the SageMaker Data Science Assistant service. The Data Science Assistant currently uses both Amazon SageMaker and Amazon Q Developer to process user prompts. */
792
+ AmazonSageMakerCanvasSMDataScienceAssistantAccess(): aws_iam.IManagedPolicy;
753
793
  /** This policy grants permissions commonly needed to use Amazon SageMaker Cluster. */
754
794
  AmazonSageMakerClusterInstanceRolePolicy(): aws_iam.IManagedPolicy;
755
795
  /** Managed policy for Service Linked Role for Amazon SageMaker Core Services */
@@ -766,6 +806,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
766
806
  AmazonSageMakerGeospatialFullAccess(): aws_iam.IManagedPolicy;
767
807
  /** Provides access to AWS services that are required to run SageMaker GroundTruth Labeling job */
768
808
  AmazonSageMakerGroundTruthExecution(): aws_iam.IManagedPolicy;
809
+ /** This policy grants permissions to Amazon SageMaker HyperPod to related AWS services such as Amazon EKS, Amazon CloudWatch etc. */
810
+ AmazonSageMakerHyperPodServiceRolePolicy(): aws_iam.IManagedPolicy;
769
811
  /** Provides access to create Amazon Augmented AI FlowDefinition resources against any Workteam. */
770
812
  AmazonSageMakerMechanicalTurkAccess(): aws_iam.IManagedPolicy;
771
813
  /** This AWS managed policy grants permissions needed to use all Amazon SageMaker Governance features. The policy also provides select access to related services (e.g., S3, KMS). */
@@ -800,6 +842,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
800
842
  AmazonSageMakerServiceCatalogProductsGlueServiceRolePolicy(): aws_iam.IManagedPolicy;
801
843
  /** Service role policy used by the AWS Lambda within the AWS ServiceCatalog provisioned products from Amazon SageMaker portfolio of products. Grants permissions to a set of related services including ECR, S3 and others. */
802
844
  AmazonSageMakerServiceCatalogProductsLambdaServiceRolePolicy(): aws_iam.IManagedPolicy;
845
+ /** This Amazon Managed Policy provides the necessary permissions to create and manage SageMaker Training Plans. It allows users to create Training Plans and Reserved Capacities, describe existing Training Plans, and perform search and listing operations. */
846
+ AmazonSageMakerTrainingPlanCreateAccess(): aws_iam.IManagedPolicy;
803
847
  /** Provides full access to Amazon Security Lake and related services needed to administer Security Lake. */
804
848
  AmazonSecurityLakeAdministrator(): aws_iam.IManagedPolicy;
805
849
  /** Policy for Amazon SecurityLake meta store manager lambda which allows the access to cloudwatch, S3, Glue and SQS. */
@@ -860,6 +904,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
860
904
  AmazonTranscribeFullAccess(): aws_iam.IManagedPolicy;
861
905
  /** Provides access to read only operation for Amazon Transcribe */
862
906
  AmazonTranscribeReadOnlyAccess(): aws_iam.IManagedPolicy;
907
+ /** Provides full access to Verified Permissions */
908
+ AmazonVerifiedPermissionsFullAccess(): aws_iam.IManagedPolicy;
909
+ /** Provides read-only access to the Verified Permissions service. */
910
+ AmazonVerifiedPermissionsReadOnlyAccess(): aws_iam.IManagedPolicy;
863
911
  /** Provides access to create network interfaces and attach them to cross-account resources */
864
912
  AmazonVPCCrossAccountNetworkInterfaceOperations(): aws_iam.IManagedPolicy;
865
913
  /** Provides full access to Amazon VPC via the AWS Management Console. */
@@ -900,6 +948,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
900
948
  AmazonWorkSpacesSelfServiceAccess(): aws_iam.IManagedPolicy;
901
949
  /** Provides customer account access to AWS WorkSpaces service for launching a Workspace. */
902
950
  AmazonWorkSpacesServiceAccess(): aws_iam.IManagedPolicy;
951
+ /** Provides full access to Amazon WorkSpaces Thin Client as well as limited access to required related services */
952
+ AmazonWorkSpacesThinClientFullAccess(): aws_iam.IManagedPolicy;
903
953
  /** Provides read-only access to Amazon WorkSpaces Thin Client and its dependencies */
904
954
  AmazonWorkSpacesThinClientReadOnlyAccess(): aws_iam.IManagedPolicy;
905
955
  /** Provides read-only access to Amazon WorkSpaces Web and its dependencies through the AWS Management Console, SDK, and CLI. */
@@ -926,6 +976,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
926
976
  AppRunnerServiceRolePolicy(): aws_iam.IManagedPolicy;
927
977
  /** Allows AppStudio to manage associated AWS resources on your behalf. */
928
978
  AppStudioServiceRolePolicy(): aws_iam.IManagedPolicy;
979
+ /** Policy for Amazon Aurora DSQL Service Linked Role */
980
+ AuroraDsqlServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
929
981
  /** Provides full access to Auto Scaling via the AWS Management Console. */
930
982
  AutoScalingConsoleFullAccess(): aws_iam.IManagedPolicy;
931
983
  /** Provides read-only access to Auto Scaling via the AWS Management Console. */
@@ -940,6 +992,20 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
940
992
  AutoScalingServiceRolePolicy(): aws_iam.IManagedPolicy;
941
993
  /** Default policy for AWS Config service role. Provides permissions required for AWS Config to track changes to your AWS resources. */
942
994
  AWSConfigRole(): aws_iam.IManagedPolicy;
995
+ /** Provides permissions to access the SSM Diagnosis S3 bucket for diagnosis and remediation of issues. */
996
+ AWSSSMAutomationDiagnosisBucketPolicy(): aws_iam.IManagedPolicy;
997
+ /** Provide permission for Diagnosing issues with SSM services by executing activities defined within Automation Documents, primarily used for running the Automation documents in a cross-account cross-region setup by triggering child automations within member accounts. */
998
+ AWSSSMDiagnosisAutomationAdministrationRolePolicy(): aws_iam.IManagedPolicy;
999
+ /** Provide permission for Diagnosing issues with SSM services by executing activities defined within Automation Documents, primarily used for running the Automation documents in a target account/region setup by diagnosing SSM service health across all nodes. */
1000
+ AWSSSMDiagnosisAutomationExecutionRolePolicy(): aws_iam.IManagedPolicy;
1001
+ /** Provides permissions for operational accounts to diagnose unmanaged nodes by providing Organisation specific permissions required by SSM automation to pull the list of member accounts within a root of an Organisation to trigger cross-account cross-region execution by allowing assuming Execution roles in target account/region. */
1002
+ AWSSSMDiagnosisAutomationOperationalAccountAdministrationRolePolicy(): aws_iam.IManagedPolicy;
1003
+ /** Provide permission for Remediating issues with SSM services by executing activities defined within Automation Documents, primarily used for running the Automation documents in a cross-account cross-region setup by triggering child automations within member accounts. */
1004
+ AWSSSMRemediationAutomationAdministrationRolePolicy(): aws_iam.IManagedPolicy;
1005
+ /** Provides permissions for Remediating issues with SSM services by executing activities defined within Automation Documents, primarily used for running the Automation documents in a target account/region setup by remediating SSM services health across all nodes. */
1006
+ AWSSSMRemediationAutomationExecutionRolePolicy(): aws_iam.IManagedPolicy;
1007
+ /** Provides permissions for operational accounts to Remediate unmanaged nodes by providing Organisation specific permissions required by SSM automation to pull the list of member accounts within a root of an Organisation to trigger cross-account cross-region execution by allowing assuming Execution roles in target account/region. */
1008
+ AWSSSMRemediationAutomationOperationalAccountAdministrationRolePolicy(): aws_iam.IManagedPolicy;
943
1009
  /** Allows users to access the Account Activity page. */
944
1010
  AWSAccountActivityAccess(): aws_iam.IManagedPolicy;
945
1011
  /** Provides full access to AWS Account Management. */
@@ -1048,6 +1114,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1048
1114
  AWSAppSyncServiceRolePolicy(): aws_iam.IManagedPolicy;
1049
1115
  /** Allows AWS Artifact read-only access to operations in AWS Organizations. */
1050
1116
  AWSArtifactAccountSync(): aws_iam.IManagedPolicy;
1117
+ /** This policy grants full permissions to list, download, accept, and terminate AWS Artifact agreements. It also includes permissions to list and enable AWS service access in the Organization service, as well as describe the organization details. Additionally, the policy provides the ability to check if the required service-linked role exists and creates one if it doesn't */
1118
+ AWSArtifactAgreementsFullAccess(): aws_iam.IManagedPolicy;
1119
+ /** This policy grants read-only access to list the AWS Artifact service agreements and to download the accepted agreements.. It also includes permissions to list as well as describe the organization details. Additionally, the policy provides the ability to check if the required service-linked role exists. */
1120
+ AWSArtifactAgreementsReadOnlyAccess(): aws_iam.IManagedPolicy;
1051
1121
  /** Provides read-only access to the AWS Artifact service reports. */
1052
1122
  AWSArtifactReportsReadOnlyAccess(): aws_iam.IManagedPolicy;
1053
1123
  /** Allows AWS Artifact to gather information about an organization via AWS Organizations service. */
@@ -1078,6 +1148,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1078
1148
  AWSBackupServiceLinkedRolePolicyForBackupTest(): aws_iam.IManagedPolicy;
1079
1149
  /** Provides AWS Backup permission to create backups on your behalf across AWS services */
1080
1150
  AWSBackupServiceRolePolicyForBackup(): aws_iam.IManagedPolicy;
1151
+ /** Policy containing permissions necessary for AWS Backup to index recovery points. */
1152
+ AWSBackupServiceRolePolicyForIndexing(): aws_iam.IManagedPolicy;
1153
+ /** Policy containing permissions necessary for AWS Backup to restore individual items in a recovery point */
1154
+ AWSBackupServiceRolePolicyForItemRestores(): aws_iam.IManagedPolicy;
1081
1155
  /** Provides AWS Backup permission to perform restores on your behalf across AWS services. This policy includes permissions to create and delete AWS resources, such as EBS volumes, RDS instances, and EFS file systems, which are part of the restore process. */
1082
1156
  AWSBackupServiceRolePolicyForRestores(): aws_iam.IManagedPolicy;
1083
1157
  /** Policy containing permissions necessary for AWS Backup to backup data in any S3 bucket. This includes read access to all S3 objects and any decrypt access for all KMS keys. */
@@ -1152,6 +1226,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1152
1226
  AWSCloudFormationReadOnlyAccess(): aws_iam.IManagedPolicy;
1153
1227
  /** Grants CloudFront Logger write permissions to CloudWatch Logs. */
1154
1228
  AWSCloudFrontLogger(): aws_iam.IManagedPolicy;
1229
+ /** Allows CloudFront to manage EC2 Elastic Network Interfaces and Security Groups on your behalf. */
1230
+ AWSCloudFrontVPCOriginServiceRolePolicy(): aws_iam.IManagedPolicy;
1155
1231
  /** Provides full access to all CloudHSM resources. */
1156
1232
  AWSCloudHSMFullAccess(): aws_iam.IManagedPolicy;
1157
1233
  /** Provides read only access to all CloudHSM resources. */
@@ -1226,6 +1302,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1226
1302
  AWSCompromisedKeyQuarantine(): aws_iam.IManagedPolicy;
1227
1303
  /** Denies access to certain actions, applied by the AWS team in the event that an IAM user's credentials have been compromised or exposed publicly. Do NOT remove this policy. Instead, please follow the instructions specified in the support case created for you regarding this event. */
1228
1304
  AWSCompromisedKeyQuarantineV2(): aws_iam.IManagedPolicy;
1305
+ /** Denies access to certain actions, applied by AWS in the event that an IAM user's credentials have been compromised or exposed publicly. The policy aims to limit the potential damage that may be caused by fraud-related activity leading to unauthorized charges, while not impacting the existing resources. Do NOT remove this policy. Instead, please follow the instructions specified in the support case created for you regarding this event. */
1306
+ AWSCompromisedKeyQuarantineV3(): aws_iam.IManagedPolicy;
1229
1307
  /** Allows Config to call AWS services and deploy config resources across organization */
1230
1308
  AWSConfigMultiAccountSetupPolicy(): aws_iam.IManagedPolicy;
1231
1309
  /** Allows AWS Config to remediate noncompliant resources on your behalf. */
@@ -1246,12 +1324,20 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1246
1324
  AWSControlTowerServiceRolePolicy(): aws_iam.IManagedPolicy;
1247
1325
  /** Grants permissions to to describe the organization of the account, create S3 buckets for the MAP program and apply tags to it, create a Cost and Usage Report, and describe Cost and Usage Report definitions. */
1248
1326
  AWSCostAndUsageReportAutomationPolicy(): aws_iam.IManagedPolicy;
1327
+ /** Gives Data Grant owners access to AWS Data Exchange actions using the AWS Management Console and SDK. */
1328
+ AWSDataExchangeDataGrantOwnerFullAccess(): aws_iam.IManagedPolicy;
1329
+ /** Gives Data Grant receiver access to AWS Data Exchange actions using the AWS Management Console and SDK. */
1330
+ AWSDataExchangeDataGrantReceiverFullAccess(): aws_iam.IManagedPolicy;
1249
1331
  /** Grants full access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange. */
1250
1332
  AWSDataExchangeFullAccess(): aws_iam.IManagedPolicy;
1251
1333
  /** Grants data provider access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange. */
1252
1334
  AWSDataExchangeProviderFullAccess(): aws_iam.IManagedPolicy;
1253
1335
  /** Grants read-only access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. */
1254
1336
  AWSDataExchangeReadOnly(): aws_iam.IManagedPolicy;
1337
+ /** Allows AWS Data Exchange to access AWS Services and Resources used or managed by AWS Data Exchange for license management. */
1338
+ AWSDataExchangeServiceRolePolicyForLicenseManagement(): aws_iam.IManagedPolicy;
1339
+ /** Allows AWS Data Exchange to read data about your AWS Organization to determine eligibility for AWS Data Exchange data grants license distribution. */
1340
+ AWSDataExchangeServiceRolePolicyForOrganizationDiscovery(): aws_iam.IManagedPolicy;
1255
1341
  /** Grants data subscriber access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange. */
1256
1342
  AWSDataExchangeSubscriberFullAccess(): aws_iam.IManagedPolicy;
1257
1343
  /** Provides appropriate permissions to AWS Data Lifecycle Manager to take actions on AWS resources */
@@ -1270,6 +1356,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1270
1356
  AWSDataSyncFullAccess(): aws_iam.IManagedPolicy;
1271
1357
  /** Provides read-only access to AWS DataSync */
1272
1358
  AWSDataSyncReadOnlyAccess(): aws_iam.IManagedPolicy;
1359
+ /** Allows DataSync to integrate with other AWS services on your behalf */
1360
+ AWSDataSyncServiceRolePolicy(): aws_iam.IManagedPolicy;
1273
1361
  /** Provides AWS Deadline Cloud workers with access to run tasks on a farm. */
1274
1362
  AWSDeadlineCloudFleetWorker(): aws_iam.IManagedPolicy;
1275
1363
  /** Provides user workstation access to AWS Deadline Cloud farms with limited Read-Only permissions to call other necessary services. Attach this policy to the user role associated with your studio. */
@@ -1312,6 +1400,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1312
1400
  AWSDirectConnectReadOnlyAccess(): aws_iam.IManagedPolicy;
1313
1401
  /** Provides AWS Direct Connect permission to create and manage AWS resources on your behalf. */
1314
1402
  AWSDirectConnectServiceRolePolicy(): aws_iam.IManagedPolicy;
1403
+ /** Provides full access to AWS Directory Service Data. */
1404
+ AWSDirectoryServiceDataFullAccess(): aws_iam.IManagedPolicy;
1405
+ /** Provides read-only access to AWS Directory Service Data */
1406
+ AWSDirectoryServiceDataReadOnlyAccess(): aws_iam.IManagedPolicy;
1315
1407
  /** Provides full access to AWS Directory Service. */
1316
1408
  AWSDirectoryServiceFullAccess(): aws_iam.IManagedPolicy;
1317
1409
  /** Provides read only access to AWS Directory Service. */
@@ -1698,6 +1790,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1698
1790
  AWSMarketplaceResaleAuthorizationServiceRolePolicy(): aws_iam.IManagedPolicy;
1699
1791
  /** Provides full access to all seller operations on the AWS Marketplace and other AWS services such as AMI management. */
1700
1792
  AWSMarketplaceSellerFullAccess(): aws_iam.IManagedPolicy;
1793
+ /** Provides sellers access to Offers and Agreements management activities. */
1794
+ AWSMarketplaceSellerOfferManagement(): aws_iam.IManagedPolicy;
1701
1795
  /** Provides sellers full access to AWS Marketplace Management Products page and other AWS services such as AMI management. */
1702
1796
  AWSMarketplaceSellerProductsFullAccess(): aws_iam.IManagedPolicy;
1703
1797
  /** Provide sellers read-only access to AWS Marketplace Management Products page. */
@@ -1748,6 +1842,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1748
1842
  AWSNetworkManagerReadOnlyAccess(): aws_iam.IManagedPolicy;
1749
1843
  /** Allow NetworkManager to access resources associated with your Global Networks */
1750
1844
  AWSNetworkManagerServiceRolePolicy(): aws_iam.IManagedPolicy;
1845
+ /** Provides access to manage AWS Config Configuration Recorder, manage AWS Config Configuration Aggregator, create AWS Config Service Linked Role for Configuration Recorder functionality, consume recorder configuration data, and read AWS Organizations data for organizational features. */
1846
+ AWSObservabilityAdminServiceRolePolicy(): aws_iam.IManagedPolicy;
1751
1847
  /** Provides full access to AWS OpsWorks. */
1752
1848
  AWSOpsWorksFullAccess(): aws_iam.IManagedPolicy;
1753
1849
  /** Enables OpsWorks instances with the CWLogs integration enabled to ship logs and create required log groups */
@@ -1786,6 +1882,18 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1786
1882
  AWSPanoramaServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
1787
1883
  /** Allows AWS Panorama to manage resources in Amazon S3, AWS IoT, AWS IoT GreenGrass, AWS Lambda, Amazon SageMaker, and Amazon CloudWatch Logs, and to pass service roles to AWS IoT, AWS IoT GreenGrass, and Amazon SageMaker. */
1788
1884
  AWSPanoramaServiceRolePolicy(): aws_iam.IManagedPolicy;
1885
+ /** Provides full access to AWS Partner Central and related AWS Services. */
1886
+ AWSPartnerCentralFullAccess(): aws_iam.IManagedPolicy;
1887
+ /** Provides necessary access for opportunity management activities. */
1888
+ AWSPartnerCentralOpportunityManagement(): aws_iam.IManagedPolicy;
1889
+ /** Provides necessary access for developer testing in the Sandbox catalog. */
1890
+ AWSPartnerCentralSandboxFullAccess(): aws_iam.IManagedPolicy;
1891
+ /** Provides access to the ResourceSnapshotJob to read a resource and snapshot it in the target engagement. */
1892
+ AWSPartnerCentralSellingResourceSnapshotJobExecutionRolePolicy(): aws_iam.IManagedPolicy;
1893
+ /** This policy can be used to grant read-only access to APIs that can read service metadata for services in your AWS account. You can use this policy to provide your partners in the Partner-Led Support Program with access to the services specified in the permissions details section below. */
1894
+ AWSPartnerLedSupportReadOnlyAccess(): aws_iam.IManagedPolicy;
1895
+ /** Grants permissions to PCS to manage resources on your behalf. */
1896
+ AWSPCSServiceRolePolicy(): aws_iam.IManagedPolicy;
1789
1897
  /** Provides full access to AWS Price List Service. */
1790
1898
  AWSPriceListServiceFullAccess(): aws_iam.IManagedPolicy;
1791
1899
  /** Provides auditor access to AWS Private Certificate Authority */
@@ -1828,6 +1936,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1828
1936
  AWSQuickSetupDevOpsGuruPermissionsBoundary(): aws_iam.IManagedPolicy;
1829
1937
  /** QuickSetup creates IAM roles which enable it to configure the Systems Manager Distributor feature on your behalf, and uses this policy when creating such roles to define the boundary of their permissions. */
1830
1938
  AWSQuickSetupDistributorPermissionsBoundary(): aws_iam.IManagedPolicy;
1939
+ /** This policy grants permissions that allow Systems Manager to run the AWSQuickSetupType-EnableAREX Automation runbook, which enables AWS Resource Explorer for use with Systems Manager. */
1940
+ AWSQuickSetupEnableAREXExecutionPolicy(): aws_iam.IManagedPolicy;
1941
+ /** This policy grants permissions that allow principals to run the AWSQuickSetupType-EnableDHMC Automation runbook, which enables Default Host Management Configuration. */
1942
+ AWSQuickSetupEnableDHMCExecutionPolicy(): aws_iam.IManagedPolicy;
1943
+ /** This policy grants administrative permissions that allow Systems Manager to create a default IAM instance profile for the Quick Setup capability and attach it to Amazon EC2 instances that don't already have an instance. profile attached. */
1944
+ AWSQuickSetupManagedInstanceProfileExecutionPolicy(): aws_iam.IManagedPolicy;
1831
1945
  /** Provides read-only permissions to access patch baselines that have been configured by an administrator in the current AWS account or organization using Quick Setup. */
1832
1946
  AWSQuickSetupPatchPolicyBaselineAccess(): aws_iam.IManagedPolicy;
1833
1947
  /** Provides permissions that allow Quick Setup to create resources associated with a patch policy configuration. */
@@ -1836,8 +1950,16 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1836
1950
  AWSQuickSetupPatchPolicyPermissionsBoundary(): aws_iam.IManagedPolicy;
1837
1951
  /** The AWSQuickSetupSchedulerPermissionsBoundary policy defines the list of permissions that are permitted in an IAM role created by Quick Setup. Quick Setup uses a role created with this policy to enable and configure scheduled operations on Amazon EC2 instances and other resources. */
1838
1952
  AWSQuickSetupSchedulerPermissionsBoundary(): aws_iam.IManagedPolicy;
1953
+ /** This policy grants administrative permssions that allow Quick Setup to create resources that are used during the Systems Manager onboarding process. */
1954
+ AWSQuickSetupSSMDeploymentRolePolicy(): aws_iam.IManagedPolicy;
1955
+ /** This policy grants permissions for listing all S3 buckets in an account; and for managing and retrieving information about specific buckets in the principal account that are managed through AWS CloudFormation templates. */
1956
+ AWSQuickSetupSSMDeploymentS3BucketRolePolicy(): aws_iam.IManagedPolicy;
1839
1957
  /** Quick Setup creates IAM roles which enable it to configure the Host Manager Quick Setup type on your behalf, and uses this policy when creating such roles to define the boundary of their permissions. */
1840
1958
  AWSQuickSetupSSMHostMgmtPermissionsBoundary(): aws_iam.IManagedPolicy;
1959
+ /** The policy grants administrative permissions that allow Quick Setup to run the a AWS CloudFormation custom resource on lifecycle events during Quick Setup deployment in Systems Manager. */
1960
+ AWSQuickSetupSSMLifecycleManagementExecutionPolicy(): aws_iam.IManagedPolicy;
1961
+ /** This policy grants permissions that allow Systems Manager to create prerequisites such as IAM roles required for Systems Manager onboarding. */
1962
+ AWSQuickSetupSSMManageResourcesExecutionPolicy(): aws_iam.IManagedPolicy;
1841
1963
  /** Provides the set of permissions required to perform QuickSight Asset Bundle Export Operations */
1842
1964
  AWSQuickSightAssetBundleExportPolicy(): aws_iam.IManagedPolicy;
1843
1965
  /** Provides the set of permissions required to perform QuickSight Asset Bundle Import Operations */
@@ -1914,6 +2036,16 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1914
2036
  AWSSecurityHubReadOnlyAccess(): aws_iam.IManagedPolicy;
1915
2037
  /** A service-linked role required for AWS Security Hub to access your resources. */
1916
2038
  AWSSecurityHubServiceRolePolicy(): aws_iam.IManagedPolicy;
2039
+ /** Policy provides customers with Read and Write permissions to case resources that are created through the Security Incident Response service. */
2040
+ AWSSecurityIncidentResponseCaseFullAccess(): aws_iam.IManagedPolicy;
2041
+ /** Policy provides customers with Read and Write permissions to all resources associated to the Security Incident Response service. */
2042
+ AWSSecurityIncidentResponseFullAccess(): aws_iam.IManagedPolicy;
2043
+ /** Policy provides customers with Read-only permissions to all resources associated to the Security Incident Response service. Permission includes access to GetCaseAttachmentDownloadUrl as well for the ability to get case attachment download URLs. */
2044
+ AWSSecurityIncidentResponseReadOnlyAccess(): aws_iam.IManagedPolicy;
2045
+ /** Provides access to AWS Resources managed or used by Security Incident Response */
2046
+ AWSSecurityIncidentResponseServiceRolePolicy(): aws_iam.IManagedPolicy;
2047
+ /** Provides access to AWS Security Incident Response to continuously monitor your environment for security threats, tune security services to reduce alert noise, and gather information to investigate potential incidents. */
2048
+ AWSSecurityIncidentResponseTriageServiceRolePolicy(): aws_iam.IManagedPolicy;
1917
2049
  /** Provides full access to service catalog admin capabilities */
1918
2050
  AWSServiceCatalogAdminFullAccess(): aws_iam.IManagedPolicy;
1919
2051
  /** Provides read-only access to Service Catalog admin capabilities */
@@ -1960,6 +2092,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1960
2092
  AWSServiceRoleForNeptuneGraphPolicy(): aws_iam.IManagedPolicy;
1961
2093
  /** Provides permissions to describe and update Private Marketplace resources and describe AWS Organizations */
1962
2094
  AWSServiceRoleForPrivateMarketplaceAdminPolicy(): aws_iam.IManagedPolicy;
2095
+ /** Policy for Procurement Insights to obtain Organization Account details */
2096
+ AWSServiceRoleForProcurementInsightsPolicy(): aws_iam.IManagedPolicy;
1963
2097
  /** Provides access to AWS services and resources necessary to migrate service instances into AWS including EC2, S3 and Cloudformation. */
1964
2098
  AWSServiceRoleForSMS(): aws_iam.IManagedPolicy;
1965
2099
  /** Provides access to the User Subscriptions service to your Identity Center resources to automatically update your subscriptions. */
@@ -1972,6 +2106,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
1972
2106
  AWSShieldDRTAccessPolicy(): aws_iam.IManagedPolicy;
1973
2107
  /** Allows AWS Shield to access AWS resources on your behalf to provide DDoS protection. */
1974
2108
  AWSShieldServiceRolePolicy(): aws_iam.IManagedPolicy;
2109
+ /** Provides access to publish metrics and provide insights for your social message sending. */
2110
+ AWSSocialMessagingServiceRolePolicy(): aws_iam.IManagedPolicy;
1975
2111
  /** Provides AWS Systems Manager for SAP with the permissions needed to manage and integrate SAP software with AWS. */
1976
2112
  AWSSSMForSAPServiceLinkedRolePolicy(): aws_iam.IManagedPolicy;
1977
2113
  /** Policy for Service Linked Role AWSServiceRoleForAmazonSSM_OpsInsights */
@@ -2168,8 +2304,14 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2168
2304
  CloudWatchFullAccess(): aws_iam.IManagedPolicy;
2169
2305
  /** Provides full access to CloudWatch. */
2170
2306
  CloudWatchFullAccessV2(): aws_iam.IManagedPolicy;
2307
+ /** Provides full access to actions for working with Amazon CloudWatch Internet Monitor. Also provides access to other services, such as Amazon CloudWatch, Amazon EC2, Amazon CloudFront, Amazon WorkSpaces, and Elastic Load Balancing, that are necessary to use the Internet Monitor service for monitoring and storing information about application traffic. */
2308
+ CloudWatchInternetMonitorFullAccess(): aws_iam.IManagedPolicy;
2309
+ /** Provides read only access to actions for working with Amazon CloudWatch Internet Monitor. Also provides access to other services in Amazon CloudWatch, including policies to retrieve information on CloudWatch metrics and to manage log queries, that are necessary to use the Internet Monitor service for monitoring and storing information about application traffic. */
2310
+ CloudWatchInternetMonitorReadOnlyAccess(): aws_iam.IManagedPolicy;
2171
2311
  /** Allows Internet Monitor to access EC2, Workspaces, and CloudFront resources, and other required services on your behalf. */
2172
2312
  CloudWatchInternetMonitorServiceRolePolicy(): aws_iam.IManagedPolicy;
2313
+ /** Provides write access to X-Ray and CloudWatch Application Signals log group. */
2314
+ CloudWatchLambdaApplicationSignalsExecutionRolePolicy(): aws_iam.IManagedPolicy;
2173
2315
  /** Policy required for the Lambda Insights Extension */
2174
2316
  CloudWatchLambdaInsightsExecutionRolePolicy(): aws_iam.IManagedPolicy;
2175
2317
  /** Provides capabilities to manage Observability Access Manager links and establish sharing of CloudWatch Logs resources */
@@ -2178,8 +2320,18 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2178
2320
  CloudWatchLogsFullAccess(): aws_iam.IManagedPolicy;
2179
2321
  /** Provides read only access to CloudWatch Logs */
2180
2322
  CloudWatchLogsReadOnlyAccess(): aws_iam.IManagedPolicy;
2323
+ /** You can use this policy in IAM roles that are attached to Amazon EC2 and Amazon EKS instance resources to send telemetry reports (metrics) to a Network Flow Monitor endpoint. */
2324
+ CloudWatchNetworkFlowMonitorAgentPublishPolicy(): aws_iam.IManagedPolicy;
2325
+ /** You can't attach CloudWatchNetworkFlowMonitorServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role named AWSServiceRoleForNetworkFlowMonitor, which publishes network telemetry aggregation results, collected by Network Flow Monitor agents, to CloudWatch. It also allows the service to use AWS Organizations to get information for multi-account scenarios. */
2326
+ CloudWatchNetworkFlowMonitorServiceRolePolicy(): aws_iam.IManagedPolicy;
2327
+ /** You can't attach CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role named AWSServiceRoleForNetworkFlowMonitor_Topology, which generates topology snapshots of resources used by Network Flow Monitor in your account. */
2328
+ CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy(): aws_iam.IManagedPolicy;
2181
2329
  /** Allows CloudWatch Network Monitor to access and manage EC2 and VPC resources, publish data to CloudWatch and access other required services on your behalf. */
2182
2330
  CloudWatchNetworkMonitorServiceRolePolicy(): aws_iam.IManagedPolicy;
2331
+ /** This policy provides user access to view OpenSearch dashboards on the CloudWatch Logs console. */
2332
+ CloudWatchOpenSearchDashboardAccess(): aws_iam.IManagedPolicy;
2333
+ /** This policy provides user access to create integration with OpenSearch to create, update, delete or view dashboards on the CloudWatch Logs console. */
2334
+ CloudWatchOpenSearchDashboardsFullAccess(): aws_iam.IManagedPolicy;
2183
2335
  /** Provides read only access to CloudWatch. */
2184
2336
  CloudWatchReadOnlyAccess(): aws_iam.IManagedPolicy;
2185
2337
  /** Provides full access to CloudWatch Synthetics. */
@@ -2214,6 +2366,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2214
2366
  DataScientist(): aws_iam.IManagedPolicy;
2215
2367
  /** This policy allows DAX to create and manage Network interface, Security group, Subnet and Vpc on behalf of customer */
2216
2368
  DAXServiceRolePolicy(): aws_iam.IManagedPolicy;
2369
+ /** Provides access to read-only APIs needed to run EC2 Declarative Policies Account Status Report. */
2370
+ DeclarativePoliciesEC2Report(): aws_iam.IManagedPolicy;
2217
2371
  /** Permissions required to support Amazon CloudWatch Contributor Insights for Amazon DynamoDB. */
2218
2372
  DynamoDBCloudWatchContributorInsightsServiceRolePolicy(): aws_iam.IManagedPolicy;
2219
2373
  /** Provide AWS DynamoDB access to KinesisDataStreams */
@@ -2268,6 +2422,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2268
2422
  FMSServiceRolePolicy(): aws_iam.IManagedPolicy;
2269
2423
  /** Allows Amazon FSx to delete its Service Linked Roles for Amazon S3 access */
2270
2424
  FSxDeleteServiceLinkedRoleAccess(): aws_iam.IManagedPolicy;
2425
+ /** Grants the required permissions for compute actions in an Amazon GameLift container fleet, including access to dependencies such as Amazon S3. */
2426
+ GameLiftContainerFleetPolicy(): aws_iam.IManagedPolicy;
2271
2427
  /** Policy to allow Gamelift GameServerGroups to manage customer resources */
2272
2428
  GameLiftGameServerGroupPolicy(): aws_iam.IManagedPolicy;
2273
2429
  /** Allow GlobalAccelerator Users full Access to all APIs */
@@ -2288,6 +2444,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2288
2444
  IAMAccessAnalyzerFullAccess(): aws_iam.IManagedPolicy;
2289
2445
  /** Provides read only access to IAM Access Analyzer resources */
2290
2446
  IAMAccessAnalyzerReadOnlyAccess(): aws_iam.IManagedPolicy;
2447
+ /** Provides access required to check the presence of root user credentials such as root user password and root user access keys using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2448
+ IAMAuditRootUserCredentials(): aws_iam.IManagedPolicy;
2449
+ /** Provides access required to create a root user password using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2450
+ IAMCreateRootUserPassword(): aws_iam.IManagedPolicy;
2451
+ /** Provides access required to delete all root user credentials such as root password and root access keys using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2452
+ IAMDeleteRootUserCredentials(): aws_iam.IManagedPolicy;
2291
2453
  /** Provides full access to IAM via the AWS Management Console. */
2292
2454
  IAMFullAccess(): aws_iam.IManagedPolicy;
2293
2455
  /** Provides read only access to IAM via the AWS Management Console. */
@@ -2352,6 +2514,10 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2352
2514
  PartnerCentralAccountManagementUserRoleAssociation(): aws_iam.IManagedPolicy;
2353
2515
  /** Provides full access to AWS services and resources, but does not allow management of Users and groups. */
2354
2516
  PowerUserAccess(): aws_iam.IManagedPolicy;
2517
+ /** Grants permissions to AWS Services and Resources used or managed by Amazon Q Apps. */
2518
+ QAppsServiceRolePolicy(): aws_iam.IManagedPolicy;
2519
+ /** Grants permissions to QBusiness to call QuickSight APIs for the QuickSight plugin */
2520
+ QBusinessQuicksightPluginPolicy(): aws_iam.IManagedPolicy;
2355
2521
  /** Grants permissions to AWS Services and Resources used or managed by Amazon Q */
2356
2522
  QBusinessServiceRolePolicy(): aws_iam.IManagedPolicy;
2357
2523
  /** Policy used by QuickSight team to access customer data produced by S3 Storage Management Analytics. */
@@ -2366,6 +2532,8 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2366
2532
  ResourceGroupsandTagEditorReadOnlyAccess(): aws_iam.IManagedPolicy;
2367
2533
  /** Allows AWS Resource Groups to query the AWS services that own your resources to keep the group up-to-date */
2368
2534
  ResourceGroupsServiceRolePolicy(): aws_iam.IManagedPolicy;
2535
+ /** Provides permissions to tag and untag all the resources supported by Resource Groups Tagging API. This policy also grants the permissions required to retrieve all tagged, or previously tagged, resources through the Resource Groups Tagging API. */
2536
+ ResourceGroupsTaggingAPITagUntagSupportedResources(): aws_iam.IManagedPolicy;
2369
2537
  /** Allows the OpenShift Amazon EBS Container Storage Interface (CSI) Driver Operator to install and maintain the Amazon EBS CSI driver on a Red Hat OpenShift Service on AWS (ROSA) cluster. The Amazon EBS CSI driver allows ROSA clusters to manage the lifecycle of Amazon EBS volumes for persistent volumes. */
2370
2538
  ROSAAmazonEBSCSIDriverOperatorPolicy(): aws_iam.IManagedPolicy;
2371
2539
  /** Allows the OpenShift Cloud Network Config Controller Operator to provision and manage networking resources for use by the Red Hat OpenShift Service on AWS (ROSA) cluster networking overlay. The OpenShift Cloud Network Operator interfaces with AWS APIs on behalf of the network plugins via CustomResourceDefinitions. The operator uses these policy permissions to manage private IP addresses for Amazon EC2 instances as part of the ROSA cluster. */
@@ -2396,14 +2564,30 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2396
2564
  Route53ResolverServiceRolePolicy(): aws_iam.IManagedPolicy;
2397
2565
  /** Enables access to AWS Services and Resources used or managed by S3 Storage Lens */
2398
2566
  S3StorageLensServiceRolePolicy(): aws_iam.IManagedPolicy;
2567
+ /** Provides access required to unlock a S3 bucket policy using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2568
+ S3UnlockBucketPolicy(): aws_iam.IManagedPolicy;
2569
+ /** This policy is used by Amazon SageMaker Studio to catalog, discover, govern, share, and analyze data in the Amazon SageMaker Studio domain. */
2570
+ SageMakerStudioDomainExecutionRolePolicy(): aws_iam.IManagedPolicy;
2571
+ /** Service role for domain level actions in the portal that are performed by Amazon SageMaker Studio. */
2572
+ SageMakerStudioDomainServiceRolePolicy(): aws_iam.IManagedPolicy;
2573
+ /** This policy provides full access to Amazon SageMaker Unified Studio via the Amazon SageMaker management console. */
2574
+ SageMakerStudioFullAccess(): aws_iam.IManagedPolicy;
2575
+ /** Amazon SageMaker Studio uses this policy to provision and manage resources in your account. */
2576
+ SageMakerStudioProjectProvisioningRolePolicy(): aws_iam.IManagedPolicy;
2577
+ /** Amazon SageMaker Studio creates IAM roles for projects users to perform data analytics, artificial intelligence, and machine learning actions, and uses this policy when creating these roles to define the permissions related to SageMaker. */
2578
+ SageMakerStudioProjectRoleMachineLearningPolicy(): aws_iam.IManagedPolicy;
2579
+ /** Amazon SageMaker creates IAM roles for Projects users to perform data analytics, artificial intelligence, and machine learning actions, and uses this policy when creating these roles to define the boundary of their permissions. */
2580
+ SageMakerStudioProjectUserRolePermissionsBoundary(): aws_iam.IManagedPolicy;
2581
+ /** Amazon SageMaker Studio creates IAM roles for projects users to perform data analytics, artificial intelligence, and machine learning actions, and uses this policy when creating these roles to define the permissions. */
2582
+ SageMakerStudioProjectUserRolePolicy(): aws_iam.IManagedPolicy;
2399
2583
  /** Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required. */
2400
2584
  SecretsManagerReadWrite(): aws_iam.IManagedPolicy;
2401
2585
  /** The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account. */
2402
2586
  SecurityAudit(): aws_iam.IManagedPolicy;
2587
+ /** Provides access to manage resources created by Security Lake. */
2588
+ SecurityLakeResourceManagementServiceRolePolicy(): aws_iam.IManagedPolicy;
2403
2589
  /** This policy grants permissions to operate the Amazon Security Lake service on your behalf */
2404
2590
  SecurityLakeServiceLinkedRole(): aws_iam.IManagedPolicy;
2405
- /** Permissions to allow the AWS Server Migration Service to migrate VMs to EC2: allows the Server Migration Service to place the migrated resources into the customer's EC2 account. */
2406
- ServerMigrationServiceRole(): aws_iam.IManagedPolicy;
2407
2591
  /** Permissions to allow the AWS Server Migration Connector to migrate VMs to EC2. Allows communication with the AWS Server Migration Service, read/write access to S3 buckets starting with 'sms-b-' and 'import-to-ec2-' as well as the buckets used for AWS Server Migration Connector upgrade, AWS Server Migration Connector registration with AWS, and metrics upload to AWS. */
2408
2592
  ServerMigrationConnector(): aws_iam.IManagedPolicy;
2409
2593
  /** Required permissions to use all features of the Server Migration Service Console */
@@ -2420,8 +2604,12 @@ export declare class AwsManagedPolicy extends AwsManagedPolicyStatic {
2420
2604
  ServiceQuotasServiceRolePolicy(): aws_iam.IManagedPolicy;
2421
2605
  /** Provides full access to the Simple Workflow configuration service. */
2422
2606
  SimpleWorkflowFullAccess(): aws_iam.IManagedPolicy;
2607
+ /** Allows SMSVoice to publish metrics to CloudWatch on your behalf */
2608
+ SMSVoiceServiceRolePolicy(): aws_iam.IManagedPolicy;
2423
2609
  /** Allows split cost allocation data to retrieve AWS Organizations information, if applicable, and collect telemetry data for the split cost allocation data services that the customer has opted in to. */
2424
2610
  SplitCostAllocationDataServiceRolePolicy(): aws_iam.IManagedPolicy;
2611
+ /** Provides access required to unlock a SQS queue policy using the Security Token Service (STS) AssumeRoot API. Use this managed policy only with the STS AssumeRoot action. */
2612
+ SQSUnlockQueuePolicy(): aws_iam.IManagedPolicy;
2425
2613
  /** Provides permissions to check Quick Setup configuration health, ensure consistent use of parameters and provisioned resources, and remediate resources when drift is detected. */
2426
2614
  SSMQuickSetupRolePolicy(): aws_iam.IManagedPolicy;
2427
2615
  /** This policy grants permissions to troubleshoot and resolve issues in an AWS account. This policy also enables the user to contact AWS support to create and manage cases. */