iamdata 0.1.202507291__py3-none-any.whl → 0.1.202508251__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of iamdata might be problematic. Click here for more details.

Files changed (101) hide show
  1. iamdata/data/actions/aoss.json +32 -0
  2. iamdata/data/actions/aps.json +51 -0
  3. iamdata/data/actions/arc-region-switch.json +334 -0
  4. iamdata/data/actions/arc-zonal-shift.json +50 -0
  5. iamdata/data/actions/auditmanager.json +14 -1
  6. iamdata/data/actions/batch.json +162 -6
  7. iamdata/data/actions/bcm-dashboards.json +74 -0
  8. iamdata/data/actions/bcm-recommended-actions.json +10 -0
  9. iamdata/data/actions/bedrock-agentcore.json +328 -30
  10. iamdata/data/actions/bedrock.json +459 -0
  11. iamdata/data/actions/budgets.json +6 -2
  12. iamdata/data/actions/cases.json +22 -2
  13. iamdata/data/actions/chatbot.json +87 -20
  14. iamdata/data/actions/cleanrooms-ml.json +11 -0
  15. iamdata/data/actions/cleanrooms.json +44 -0
  16. iamdata/data/actions/connect.json +23 -0
  17. iamdata/data/actions/datazone.json +64 -0
  18. iamdata/data/actions/deadline.json +32 -10
  19. iamdata/data/actions/dms.json +1 -8
  20. iamdata/data/actions/ds.json +122 -0
  21. iamdata/data/actions/events.json +16 -0
  22. iamdata/data/actions/glue.json +32 -0
  23. iamdata/data/actions/groundtruthlabeling.json +7 -7
  24. iamdata/data/actions/guardduty.json +173 -0
  25. iamdata/data/actions/imagebuilder.json +185 -237
  26. iamdata/data/actions/iot.json +31 -0
  27. iamdata/data/actions/iotmanagedintegrations.json +11 -4
  28. iamdata/data/actions/iotsitewise.json +271 -0
  29. iamdata/data/actions/observabilityadmin.json +196 -0
  30. iamdata/data/actions/odb.json +4 -4
  31. iamdata/data/actions/outposts.json +15 -0
  32. iamdata/data/actions/partnercentral.json +96 -32
  33. iamdata/data/actions/qbusiness.json +20 -46
  34. iamdata/data/actions/quicksight.json +2 -6
  35. iamdata/data/actions/rds.json +12 -6
  36. iamdata/data/actions/repostspace.json +90 -0
  37. iamdata/data/actions/s3.json +261 -125
  38. iamdata/data/actions/s3express.json +24 -4
  39. iamdata/data/actions/sagemaker.json +128 -0
  40. iamdata/data/actions/security-ir.json +23 -8
  41. iamdata/data/actions/securityhub.json +12 -0
  42. iamdata/data/actions/servicediscovery.json +140 -14
  43. iamdata/data/actions/ses.json +286 -2
  44. iamdata/data/actions/social-messaging.json +64 -0
  45. iamdata/data/actions/sso.json +34 -50
  46. iamdata/data/actions/transcribe.json +12 -0
  47. iamdata/data/actions/uxc.json +26 -0
  48. iamdata/data/actions/workspaces-web.json +112 -0
  49. iamdata/data/actions/workspaces.json +114 -0
  50. iamdata/data/actions/xray.json +9 -3
  51. iamdata/data/conditionKeys/arc-region-switch.json +17 -0
  52. iamdata/data/conditionKeys/bcm-dashboards.json +1 -0
  53. iamdata/data/conditionKeys/bcm-recommended-actions.json +1 -0
  54. iamdata/data/conditionKeys/chatbot.json +17 -1
  55. iamdata/data/conditionKeys/ebs.json +2 -2
  56. iamdata/data/conditionKeys/imagebuilder.json +2 -2
  57. iamdata/data/conditionKeys/iotmanagedintegrations.json +10 -0
  58. iamdata/data/conditionKeys/observabilityadmin.json +17 -1
  59. iamdata/data/conditionKeys/quicksight.json +0 -5
  60. iamdata/data/conditionKeys/rds.json +5 -0
  61. iamdata/data/conditionKeys/s3.json +5 -0
  62. iamdata/data/conditionKeys/s3express.json +5 -0
  63. iamdata/data/conditionKeys/savingsplans.json +1 -1
  64. iamdata/data/conditionKeys/secretsmanager.json +1 -1
  65. iamdata/data/conditionKeys/servicediscovery.json +5 -0
  66. iamdata/data/conditionKeys/ses.json +5 -0
  67. iamdata/data/conditionKeys/uxc.json +1 -0
  68. iamdata/data/conditionKeys/xray.json +10 -0
  69. iamdata/data/conditionPatterns.json +134 -0
  70. iamdata/data/metadata.json +2 -2
  71. iamdata/data/resourceTypes/apigateway.json +3 -3
  72. iamdata/data/resourceTypes/arc-region-switch.json +9 -0
  73. iamdata/data/resourceTypes/batch.json +14 -0
  74. iamdata/data/resourceTypes/bcm-dashboards.json +1 -0
  75. iamdata/data/resourceTypes/bcm-recommended-actions.json +1 -0
  76. iamdata/data/resourceTypes/bedrock-agentcore.json +8 -0
  77. iamdata/data/resourceTypes/bedrock.json +14 -0
  78. iamdata/data/resourceTypes/chatbot.json +8 -2
  79. iamdata/data/resourceTypes/deadline.json +4 -1
  80. iamdata/data/resourceTypes/execute-api.json +1 -1
  81. iamdata/data/resourceTypes/guardduty.json +14 -0
  82. iamdata/data/resourceTypes/imagebuilder.json +12 -18
  83. iamdata/data/resourceTypes/iotsitewise.json +7 -0
  84. iamdata/data/resourceTypes/mpa.json +3 -3
  85. iamdata/data/resourceTypes/observabilityadmin.json +16 -1
  86. iamdata/data/resourceTypes/partnercentral.json +8 -2
  87. iamdata/data/resourceTypes/qbusiness.json +0 -4
  88. iamdata/data/resourceTypes/s3.json +19 -1
  89. iamdata/data/resourceTypes/s3express.json +5 -1
  90. iamdata/data/resourceTypes/securityhub.json +12 -3
  91. iamdata/data/resourceTypes/ses.json +11 -0
  92. iamdata/data/resourceTypes/uxc.json +1 -0
  93. iamdata/data/resourceTypes/workspaces-web.json +7 -0
  94. iamdata/data/resourceTypes/workspaces.json +4 -0
  95. iamdata/data/serviceNames.json +4 -0
  96. iamdata/data/services.json +4 -0
  97. iamdata/data/unassociatedConditions.json +20 -0
  98. {iamdata-0.1.202507291.dist-info → iamdata-0.1.202508251.dist-info}/METADATA +1 -1
  99. {iamdata-0.1.202507291.dist-info → iamdata-0.1.202508251.dist-info}/RECORD +101 -87
  100. {iamdata-0.1.202507291.dist-info → iamdata-0.1.202508251.dist-info}/WHEEL +0 -0
  101. {iamdata-0.1.202507291.dist-info → iamdata-0.1.202508251.dist-info}/licenses/LICENSE.txt +0 -0
@@ -74,6 +74,14 @@
74
74
  ],
75
75
  "dependentActions": []
76
76
  },
77
+ "createindex": {
78
+ "name": "CreateIndex",
79
+ "description": "Grants permission to create an opensearch index",
80
+ "accessLevel": "Write",
81
+ "resourceTypes": [],
82
+ "conditionKeys": [],
83
+ "dependentActions": []
84
+ },
77
85
  "createlifecyclepolicy": {
78
86
  "name": "CreateLifecyclePolicy",
79
87
  "description": "Grants permission to create a lifecycle policy",
@@ -154,6 +162,14 @@
154
162
  "conditionKeys": [],
155
163
  "dependentActions": []
156
164
  },
165
+ "deleteindex": {
166
+ "name": "DeleteIndex",
167
+ "description": "Grants permission to delete an opensearch index",
168
+ "accessLevel": "Write",
169
+ "resourceTypes": [],
170
+ "conditionKeys": [],
171
+ "dependentActions": []
172
+ },
157
173
  "deletelifecyclepolicy": {
158
174
  "name": "DeleteLifecyclePolicy",
159
175
  "description": "Grants permission to delete a lifecycle policy",
@@ -209,6 +225,14 @@
209
225
  "conditionKeys": [],
210
226
  "dependentActions": []
211
227
  },
228
+ "getindex": {
229
+ "name": "GetIndex",
230
+ "description": "Grants permission to get an opensearch index",
231
+ "accessLevel": "Read",
232
+ "resourceTypes": [],
233
+ "conditionKeys": [],
234
+ "dependentActions": []
235
+ },
212
236
  "getpoliciesstats": {
213
237
  "name": "GetPoliciesStats",
214
238
  "description": "Grants permission to get statistis about the security policies in your account",
@@ -347,6 +371,14 @@
347
371
  "conditionKeys": [],
348
372
  "dependentActions": []
349
373
  },
374
+ "updateindex": {
375
+ "name": "UpdateIndex",
376
+ "description": "Grants permission to update an opensearch index",
377
+ "accessLevel": "Write",
378
+ "resourceTypes": [],
379
+ "conditionKeys": [],
380
+ "dependentActions": []
381
+ },
350
382
  "updatelifecyclepolicy": {
351
383
  "name": "UpdateLifecyclePolicy",
352
384
  "description": "Grants permission to update a lifecycle policy",
@@ -195,6 +195,23 @@
195
195
  ],
196
196
  "dependentActions": []
197
197
  },
198
+ "deleteresourcepolicy": {
199
+ "name": "DeleteResourcePolicy",
200
+ "description": "Grants permission to delete workspace resource policy",
201
+ "accessLevel": "Write",
202
+ "resourceTypes": [
203
+ {
204
+ "name": "workspace",
205
+ "required": true,
206
+ "conditionKeys": [],
207
+ "dependentActions": []
208
+ }
209
+ ],
210
+ "conditionKeys": [
211
+ "aws:ResourceTag/${TagKey}"
212
+ ],
213
+ "dependentActions": []
214
+ },
198
215
  "deleterulegroupsnamespace": {
199
216
  "name": "DeleteRuleGroupsNamespace",
200
217
  "description": "Grants permission to delete a rule groups namespace",
@@ -297,6 +314,23 @@
297
314
  ],
298
315
  "dependentActions": []
299
316
  },
317
+ "describeresourcepolicy": {
318
+ "name": "DescribeResourcePolicy",
319
+ "description": "Grants permission to describe workspace resource policy",
320
+ "accessLevel": "Read",
321
+ "resourceTypes": [
322
+ {
323
+ "name": "workspace",
324
+ "required": true,
325
+ "conditionKeys": [],
326
+ "dependentActions": []
327
+ }
328
+ ],
329
+ "conditionKeys": [
330
+ "aws:ResourceTag/${TagKey}"
331
+ ],
332
+ "dependentActions": []
333
+ },
300
334
  "describerulegroupsnamespace": {
301
335
  "name": "DescribeRuleGroupsNamespace",
302
336
  "description": "Grants permission to describe a rule groups namespace",
@@ -657,6 +691,23 @@
657
691
  ],
658
692
  "dependentActions": []
659
693
  },
694
+ "putresourcepolicy": {
695
+ "name": "PutResourcePolicy",
696
+ "description": "Grants permission to create and update workspace resource policy",
697
+ "accessLevel": "Write",
698
+ "resourceTypes": [
699
+ {
700
+ "name": "workspace",
701
+ "required": true,
702
+ "conditionKeys": [],
703
+ "dependentActions": []
704
+ }
705
+ ],
706
+ "conditionKeys": [
707
+ "aws:ResourceTag/${TagKey}"
708
+ ],
709
+ "dependentActions": []
710
+ },
660
711
  "putrulegroupsnamespace": {
661
712
  "name": "PutRuleGroupsNamespace",
662
713
  "description": "Grants permission to update a rule groups namespace",
@@ -0,0 +1,334 @@
1
+ {
2
+ "approveplanexecutionstep": {
3
+ "name": "ApprovePlanExecutionStep",
4
+ "description": "Grants permission to approve a plan execution step",
5
+ "accessLevel": "Write",
6
+ "resourceTypes": [
7
+ {
8
+ "name": "plan",
9
+ "required": true,
10
+ "conditionKeys": [],
11
+ "dependentActions": []
12
+ }
13
+ ],
14
+ "conditionKeys": [],
15
+ "dependentActions": []
16
+ },
17
+ "cancelplanexecution": {
18
+ "name": "CancelPlanExecution",
19
+ "description": "Grants permission to cancel a plan execution",
20
+ "accessLevel": "Write",
21
+ "resourceTypes": [
22
+ {
23
+ "name": "plan",
24
+ "required": true,
25
+ "conditionKeys": [],
26
+ "dependentActions": []
27
+ }
28
+ ],
29
+ "conditionKeys": [],
30
+ "dependentActions": []
31
+ },
32
+ "createplan": {
33
+ "name": "CreatePlan",
34
+ "description": "Grants permission to create a plan",
35
+ "accessLevel": "Write",
36
+ "resourceTypes": [
37
+ {
38
+ "name": "plan",
39
+ "required": true,
40
+ "conditionKeys": [],
41
+ "dependentActions": []
42
+ }
43
+ ],
44
+ "conditionKeys": [
45
+ "aws:RequestTag/${TagKey}",
46
+ "aws:TagKeys"
47
+ ],
48
+ "dependentActions": []
49
+ },
50
+ "deleteplan": {
51
+ "name": "DeletePlan",
52
+ "description": "Grants permission to delete a plan",
53
+ "accessLevel": "Write",
54
+ "resourceTypes": [
55
+ {
56
+ "name": "plan",
57
+ "required": true,
58
+ "conditionKeys": [],
59
+ "dependentActions": []
60
+ }
61
+ ],
62
+ "conditionKeys": [],
63
+ "dependentActions": []
64
+ },
65
+ "deleteresourcepolicy": {
66
+ "name": "DeleteResourcePolicy",
67
+ "isPermissionOnly": true,
68
+ "description": "Grants permission to delete the RAM access control policy for a plan",
69
+ "accessLevel": "Permissions management",
70
+ "resourceTypes": [],
71
+ "conditionKeys": [],
72
+ "dependentActions": []
73
+ },
74
+ "getplan": {
75
+ "name": "GetPlan",
76
+ "description": "Grants permission to get information about plans in all AWS Regions using a control plane",
77
+ "accessLevel": "Read",
78
+ "resourceTypes": [
79
+ {
80
+ "name": "plan",
81
+ "required": true,
82
+ "conditionKeys": [],
83
+ "dependentActions": []
84
+ }
85
+ ],
86
+ "conditionKeys": [],
87
+ "dependentActions": []
88
+ },
89
+ "getplanevaluationstatus": {
90
+ "name": "GetPlanEvaluationStatus",
91
+ "description": "Grants permission to get a plan's evaluation status",
92
+ "accessLevel": "Read",
93
+ "resourceTypes": [
94
+ {
95
+ "name": "plan",
96
+ "required": true,
97
+ "conditionKeys": [],
98
+ "dependentActions": []
99
+ }
100
+ ],
101
+ "conditionKeys": [],
102
+ "dependentActions": []
103
+ },
104
+ "getplanexecution": {
105
+ "name": "GetPlanExecution",
106
+ "description": "Grants permission to get plan execution details and setup information",
107
+ "accessLevel": "Read",
108
+ "resourceTypes": [
109
+ {
110
+ "name": "plan",
111
+ "required": true,
112
+ "conditionKeys": [],
113
+ "dependentActions": []
114
+ }
115
+ ],
116
+ "conditionKeys": [],
117
+ "dependentActions": []
118
+ },
119
+ "getplaninregion": {
120
+ "name": "GetPlanInRegion",
121
+ "description": "Grants permission to get information about a plan in a specific AWS Region using the Region switch Regional data plane",
122
+ "accessLevel": "Read",
123
+ "resourceTypes": [
124
+ {
125
+ "name": "plan",
126
+ "required": true,
127
+ "conditionKeys": [],
128
+ "dependentActions": []
129
+ }
130
+ ],
131
+ "conditionKeys": [],
132
+ "dependentActions": []
133
+ },
134
+ "getresourcepolicy": {
135
+ "name": "GetResourcePolicy",
136
+ "isPermissionOnly": true,
137
+ "description": "Grants permission to get the resource policy of a plan",
138
+ "accessLevel": "Permissions management",
139
+ "resourceTypes": [
140
+ {
141
+ "name": "plan",
142
+ "required": true,
143
+ "conditionKeys": [],
144
+ "dependentActions": []
145
+ }
146
+ ],
147
+ "conditionKeys": [],
148
+ "dependentActions": []
149
+ },
150
+ "listplanexecutionevents": {
151
+ "name": "ListPlanExecutionEvents",
152
+ "description": "Grants permission to list plan execution events",
153
+ "accessLevel": "List",
154
+ "resourceTypes": [
155
+ {
156
+ "name": "plan",
157
+ "required": true,
158
+ "conditionKeys": [],
159
+ "dependentActions": []
160
+ }
161
+ ],
162
+ "conditionKeys": [],
163
+ "dependentActions": []
164
+ },
165
+ "listplanexecutions": {
166
+ "name": "ListPlanExecutions",
167
+ "description": "Grants permission to list plan executions",
168
+ "accessLevel": "List",
169
+ "resourceTypes": [
170
+ {
171
+ "name": "plan",
172
+ "required": true,
173
+ "conditionKeys": [],
174
+ "dependentActions": []
175
+ }
176
+ ],
177
+ "conditionKeys": [],
178
+ "dependentActions": []
179
+ },
180
+ "listplans": {
181
+ "name": "ListPlans",
182
+ "description": "Grants permission to list plans in all AWS Regions using a control plane",
183
+ "accessLevel": "List",
184
+ "resourceTypes": [],
185
+ "conditionKeys": [],
186
+ "dependentActions": []
187
+ },
188
+ "listplansinregion": {
189
+ "name": "ListPlansInRegion",
190
+ "description": "Grants permission to list plans in a specific AWS Region using the Region switch Regional data plane",
191
+ "accessLevel": "List",
192
+ "resourceTypes": [],
193
+ "conditionKeys": [],
194
+ "dependentActions": []
195
+ },
196
+ "listroute53healthchecks": {
197
+ "name": "ListRoute53HealthChecks",
198
+ "description": "Grants permission to list Route 53 health checks",
199
+ "accessLevel": "List",
200
+ "resourceTypes": [
201
+ {
202
+ "name": "plan",
203
+ "required": true,
204
+ "conditionKeys": [],
205
+ "dependentActions": []
206
+ }
207
+ ],
208
+ "conditionKeys": [],
209
+ "dependentActions": []
210
+ },
211
+ "listtagsforresource": {
212
+ "name": "ListTagsForResource",
213
+ "description": "Grants permission to list tags for a resource",
214
+ "accessLevel": "Read",
215
+ "resourceTypes": [
216
+ {
217
+ "name": "plan",
218
+ "required": true,
219
+ "conditionKeys": [],
220
+ "dependentActions": []
221
+ }
222
+ ],
223
+ "conditionKeys": [
224
+ "aws:ResourceTag/${TagKey}"
225
+ ],
226
+ "dependentActions": []
227
+ },
228
+ "putresourcepolicy": {
229
+ "name": "PutResourcePolicy",
230
+ "isPermissionOnly": true,
231
+ "description": "Grants permission to define the RAM access control policy for a plan",
232
+ "accessLevel": "Permissions management",
233
+ "resourceTypes": [],
234
+ "conditionKeys": [],
235
+ "dependentActions": []
236
+ },
237
+ "startplanexecution": {
238
+ "name": "StartPlanExecution",
239
+ "description": "Grants permission to start a plan execution",
240
+ "accessLevel": "Write",
241
+ "resourceTypes": [
242
+ {
243
+ "name": "plan",
244
+ "required": true,
245
+ "conditionKeys": [],
246
+ "dependentActions": []
247
+ }
248
+ ],
249
+ "conditionKeys": [],
250
+ "dependentActions": []
251
+ },
252
+ "tagresource": {
253
+ "name": "TagResource",
254
+ "description": "Grants permission to tag a resource",
255
+ "accessLevel": "Tagging",
256
+ "resourceTypes": [
257
+ {
258
+ "name": "plan",
259
+ "required": true,
260
+ "conditionKeys": [],
261
+ "dependentActions": []
262
+ }
263
+ ],
264
+ "conditionKeys": [
265
+ "aws:RequestTag/${TagKey}",
266
+ "aws:ResourceTag/${TagKey}",
267
+ "aws:TagKeys"
268
+ ],
269
+ "dependentActions": []
270
+ },
271
+ "untagresource": {
272
+ "name": "UntagResource",
273
+ "description": "Grants permission to remove tags from a resource",
274
+ "accessLevel": "Tagging",
275
+ "resourceTypes": [
276
+ {
277
+ "name": "plan",
278
+ "required": true,
279
+ "conditionKeys": [],
280
+ "dependentActions": []
281
+ }
282
+ ],
283
+ "conditionKeys": [
284
+ "aws:ResourceTag/${TagKey}",
285
+ "aws:TagKeys"
286
+ ],
287
+ "dependentActions": []
288
+ },
289
+ "updateplan": {
290
+ "name": "UpdatePlan",
291
+ "description": "Grants permission to update a plan",
292
+ "accessLevel": "Write",
293
+ "resourceTypes": [
294
+ {
295
+ "name": "plan",
296
+ "required": true,
297
+ "conditionKeys": [],
298
+ "dependentActions": []
299
+ }
300
+ ],
301
+ "conditionKeys": [],
302
+ "dependentActions": []
303
+ },
304
+ "updateplanexecution": {
305
+ "name": "UpdatePlanExecution",
306
+ "description": "Grants permission to update a plan execution",
307
+ "accessLevel": "Write",
308
+ "resourceTypes": [
309
+ {
310
+ "name": "plan",
311
+ "required": true,
312
+ "conditionKeys": [],
313
+ "dependentActions": []
314
+ }
315
+ ],
316
+ "conditionKeys": [],
317
+ "dependentActions": []
318
+ },
319
+ "updateplanexecutionstep": {
320
+ "name": "UpdatePlanExecutionStep",
321
+ "description": "Grants permission to update a plan execution step",
322
+ "accessLevel": "Write",
323
+ "resourceTypes": [
324
+ {
325
+ "name": "plan",
326
+ "required": true,
327
+ "conditionKeys": [],
328
+ "dependentActions": []
329
+ }
330
+ ],
331
+ "conditionKeys": [],
332
+ "dependentActions": []
333
+ }
334
+ }
@@ -1,4 +1,29 @@
1
1
  {
2
+ "cancelpracticerun": {
3
+ "name": "CancelPracticeRun",
4
+ "description": "Grants permission to cancel an active practice run",
5
+ "accessLevel": "Write",
6
+ "resourceTypes": [
7
+ {
8
+ "name": "ALB",
9
+ "required": true,
10
+ "conditionKeys": [],
11
+ "dependentActions": []
12
+ },
13
+ {
14
+ "name": "NLB",
15
+ "required": true,
16
+ "conditionKeys": [],
17
+ "dependentActions": []
18
+ }
19
+ ],
20
+ "conditionKeys": [
21
+ "arc-zonal-shift:ResourceIdentifier",
22
+ "aws:ResourceTag/${TagKey}",
23
+ "elasticloadbalancing:ResourceTag/${TagKey}"
24
+ ],
25
+ "dependentActions": []
26
+ },
2
27
  "cancelzonalshift": {
3
28
  "name": "CancelZonalShift",
4
29
  "description": "Grants permission to cancel an active zonal shift",
@@ -134,6 +159,31 @@
134
159
  "conditionKeys": [],
135
160
  "dependentActions": []
136
161
  },
162
+ "startpracticerun": {
163
+ "name": "StartPracticeRun",
164
+ "description": "Grants permission to start a practice run",
165
+ "accessLevel": "Write",
166
+ "resourceTypes": [
167
+ {
168
+ "name": "ALB",
169
+ "required": true,
170
+ "conditionKeys": [],
171
+ "dependentActions": []
172
+ },
173
+ {
174
+ "name": "NLB",
175
+ "required": true,
176
+ "conditionKeys": [],
177
+ "dependentActions": []
178
+ }
179
+ ],
180
+ "conditionKeys": [
181
+ "arc-zonal-shift:ResourceIdentifier",
182
+ "aws:ResourceTag/${TagKey}",
183
+ "elasticloadbalancing:ResourceTag/${TagKey}"
184
+ ],
185
+ "dependentActions": []
186
+ },
137
187
  "startzonalshift": {
138
188
  "name": "StartZonalShift",
139
189
  "description": "Grants permission to start a zonal shift",
@@ -117,7 +117,14 @@
117
117
  "name": "CreateAssessmentFramework",
118
118
  "description": "Grants permission to create a framework for use in AWS Audit Manager",
119
119
  "accessLevel": "Write",
120
- "resourceTypes": [],
120
+ "resourceTypes": [
121
+ {
122
+ "name": "control",
123
+ "required": true,
124
+ "conditionKeys": [],
125
+ "dependentActions": []
126
+ }
127
+ ],
121
128
  "conditionKeys": [
122
129
  "aws:RequestTag/${TagKey}",
123
130
  "aws:TagKeys",
@@ -734,6 +741,12 @@
734
741
  "required": true,
735
742
  "conditionKeys": [],
736
743
  "dependentActions": []
744
+ },
745
+ {
746
+ "name": "control",
747
+ "required": true,
748
+ "conditionKeys": [],
749
+ "dependentActions": []
737
750
  }
738
751
  ],
739
752
  "conditionKeys": [],