AliyunServiceRolePolicyForGovernance 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForGovernance 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2021-04-11 02:59:48
更新时间:2023-08-31 03:34:09
当前版本:v26
策略内容
{
"Statement": [
{
"Effect": "Allow",
"Action": [
"resourcemanager:GetResourceDirectory",
"resourcemanager:InitResourceDirectory",
"resourcemanager:ListResources",
"resourcemanager:ListFoldersForParent",
"resourcemanager:ListAccountsForParent",
"resourcemanager:ListAccounts",
"resourcemanager:CreateFolder",
"resourcemanager:CreateResourceAccount",
"resourcemanager:GetFolder",
"resourcemanager:GetAccount",
"resourcemanager:UpdateFolder",
"resourcemanager:DeleteFolder",
"resourcemanager:MoveAccount",
"resourcemanager:UpdateAccount",
"resourcemanager:ListHandshakesForResourceDirectory",
"resourcemanager:GetPayerForAccount",
"resourcemanager:EnableControlPolicy",
"resourcemanager:CreateControlPolicy",
"resourcemanager:AttachControlPolicy",
"resourcemanager:UpdateControlPolicy",
"resourcemanager:GetControlPolicy",
"resourcemanager:ListControlPolicyAttachmentsForTarget",
"resourcemanager:ListControlPolicies",
"resourcemanager:InviteAccountToResourceDirectory",
"resourcemanager:GetHandshake",
"resourcemanager:ListTagResources",
"resourcemanager:RegisterDelegatedAdministrator",
"resourcemanager:ListDelegatedAdministrators",
"resourcemanager:DeregisterDelegatedAdministrator",
"resourcemanager:DeleteControlPolicy",
"resourcemanager:DetachControlPolicy"
],
"Resource": "*"
},
{
"Action": [
"ecs:DescribeInstances",
"cen:DescribeCenBandwidthPackages",
"ecs:DescribeDisks",
"ecs:DescribeSnapshots",
"ecs:DescribeImages",
"vpc:DescribeVpcs",
"vpc:DescribeVSwitches",
"cen:DescribeCens",
"oss:ListBuckets",
"elasticsearch:ListInstance",
"eci:DescribeContainerGroups",
"dds:DescribeDBInstances",
"kvstore:DescribeInstances",
"polardb:DescribeDBClusters",
"alb:ListLoadBalancers",
"slb:DescribeLoadBalancers",
"rocketmq:ListInstances",
"polardbx:DescribeDBInstances",
"cs:GetClusters",
"cs:GetClustersByUid",
"rds:DescribeDBInstances",
"drds:DescribeDrdsInstances",
"log:ListLogstore",
"vpc:DescribeBandwidthPackages",
"vpc:DescribeCommonBandwidthPackages",
"vpc:DescribeEipAddresses",
"vpc:DescribeNatGateways",
"log:ListProject",
"mq:OnsInstanceList",
"mq:ListInstance",
"yundun-bastionhost:DescribeInstanceBastionhost",
"arms:ListPrometheusInstance",
"arms:ListPrometheusInstanceByTagAndResourceGroupId"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "governance.aliyuncs.com"
}
}
},
{
"Action": "sts:AssumeRole",
"Effect": "Allow",
"Resource": "acs:ram::*:role/aliyungovernance*"
},
{
"Action": [
"actiontrail:CreateTrail",
"actiontrail:DescribeTrails",
"actiontrail:UpdateTrail",
"actiontrail:DeleteTrail",
"actiontrail:StartLogging",
"actiontrail:LookupEvents",
"config:PutDeliveryChannel",
"config:DescribeDeliveryChannels",
"config:CreateAggregator",
"config:UpdateAggregator",
"config:ListAggregators",
"config:GetAggregator",
"config:StartConfigurationRecorder",
"config:DescribeConfigurationRecorder",
"config:PutConfigurationRecorder",
"config:ListAggregateCompliancePacks",
"config:GetAggregateCompliancePack",
"config:CreateAggregateCompliancePack",
"config:UpdateAggregateCompliancePack",
"config:DeleteAggregateCompliancePacks",
"config:GetAggregateConfigRuleComplianceByPack",
"config:GetConfigRule",
"config:UpdateConfigRule",
"config:CreateCompliancePack",
"config:UpdateCompliancePack",
"config:GetCompliancePack",
"config:DeleteCompliancePacks",
"config:GetAggregateResourceCountsGroupByRegion",
"config:GetAggregateResourceCountsGroupByResourceType",
"config:GetDiscoveredResourceCountsGroupByRegion",
"config:GetDiscoveredResourceCountsGroupByResourceType",
"config:DetachAggregateConfigRuleToCompliancePack",
"config:AttachAggregateConfigRuleToCompliancePack",
"config:GetAggregateConfigRule",
"config:ListAggregateConfigRules",
"config:CreateAggregateConfigRule",
"config:UpdateAggregateConfigRule",
"config:DeleteAggregateConfigRules",
"config:GetManagedRule",
"config:ListAggregateConfigRuleEvaluationResults",
"config:ListAggregateDiscoveredResources",
"config:GetAggregateResourceComplianceByConfigRule",
"config:ListDiscoveredResources",
"config:ListConfigRuleEvaluationResults",
"config:GetResourceComplianceByConfigRule",
"config:ListConfigRules",
"config:StartAggregateConfigRuleEvaluation",
"config:StartConfigRuleEvaluation",
"config:ListCompliancePacks",
"config:DetachConfigRuleToCompliancePack",
"config:AttachConfigRuleToCompliancePack",
"config:DeleteConfigRules",
"config:CreateConfigRule",
"config:CreateRemediation",
"config:ListRemediations",
"config:StartRemediation",
"config:ListRemediationExecutions",
"config:DeleteAggregateConfigDeliveryChannel",
"config:ListAggregateConfigDeliveryChannels",
"config:CreateAggregateConfigDeliveryChannel",
"config:GetAggregateConfigDeliveryChannel",
"config:UpdateAggregateConfigDeliveryChannel",
"config:ListConfigDeliveryChannels",
"config:ListManagedRules",
"config:IgnoreEvaluationResults",
"config:RevertEvaluationResults"
],
"Effect": "Allow",
"Resource": "*"
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": [
"actiontrail.aliyuncs.com",
"config.aliyuncs.com",
"cloudsso.aliyuncs.com",
"cloudmonitor.aliyuncs.com"
]
}
}
},
{
"Action": [
"cms:CreateServiceLinkRoleForCloudMonitor",
"cms:CheckRamRoleForCloudMonitor",
"cms:CreateAnalysisSuit",
"cms:DescribeAnalysisSuit",
"cms:DescribeAnalysisTask",
"cms:RestartAnalysisTask"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"arms:GetUserArmsPromClusterList",
"arms:UseHighPriorityAlert",
"arms:HighPriorityAlertClearRatio"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"ram:GetSAMLProvider",
"ram:CreateSAMLProvider",
"ram:CreatePolicy",
"ram:ListRoles",
"ram:GetRole",
"ram:ListPolicies",
"ram:ListSAMLProviders"
],
"Resource": [
"acs:ram:*:*:policy/*",
"acs:ram:*:*:saml-provider/*",
"acs:ram:*:*:role/*"
],
"Effect": "Allow"
},
{
"Action": [
"ram:ListEntitiesForPolicy",
"ram:ListPolicyVersions",
"ram:DeletePolicyVersion",
"ram:CreatePolicyVersion",
"ram:DeletePolicy"
],
"Resource": "acs:ram:*:*:policy/AliyunReservedGovernance*",
"Effect": "Allow"
},
{
"Effect": "Allow",
"Action": [
"ram:UpdateSAMLProvider",
"ram:DeleteSAMLProvider",
"ram:AttachPolicyToRole",
"ram:DetachPolicyFromRole",
"ram:ListPoliciesForRole",
"ram:CreateRole",
"ram:UpdateRole",
"ram:GetPolicy",
"ram:DeleteRole"
],
"Resource": [
"acs:ram:*:*:saml-provider/AliyunReservedGovernance*",
"acs:ram:*:*:role/aliyunreservedgovernance*",
"acs:ram:*:system:policy/*",
"acs:ram:*:*:policy/AliyunReservedGovernance*"
]
},
{
"Effect": "Allow",
"Action": [
"cloudsso:EnableService",
"cloudsso:ListDirectories",
"cloudsso:ListAccessConfigurations",
"cloudsso:CreateDirectory",
"cloudsso:SetMFAAuthenticationStatus",
"cloudsso:SetExternalSAMLIdentityProvider",
"cloudsso:GetDirectory",
"cloudsso:GetMFAAuthenticationStatus",
"cloudsso:GetSCIMSynchronizationStatus",
"cloudsso:GetExternalSAMLIdentityProvider",
"cloudsso:CreateAccessConfiguration",
"cloudsso:GetAccessConfiguration",
"cloudsso:ListPermissionPoliciesInAccessConfiguration",
"cloudsso:RemovePermissionPolicyFromAccessConfiguration",
"cloudsso:AddPermissionPolicyToAccessConfiguration",
"cloudsso:ListAccessConfigurationProvisionings",
"cloudsso:ProvisionAccessConfiguration",
"cloudsso:GetTaskStatus",
"cloudsso:UpdateAccessConfiguration",
"cloudsso:DeleteAccessConfiguration",
"cloudsso:GetServiceStatus",
"cloudsso:ListUsers",
"cloudsso:ListAccessAssignments",
"cloudsso:CreateAccessAssignment",
"cloudsso:ListGroups"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"tag:ListTagResources",
"tag:DescribeRegions",
"tag:ListTagKeys",
"tag:CheckCreatedByEnabled"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ram:GenerateGovernanceReport",
"ram:GetGovernanceReportStatus",
"ram:ListRecentGovernanceMetrics",
"ram:GetGovernanceItemReport"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ecs:ModifyImageSharePermission",
"ecs:DescribeImageSharePermission"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ram:GenerateCredentialReport",
"ram:GetCredentialReport",
"ram:GetAccountSummary",
"ram:ListPolicyAttachments",
"config:GetApiStatisticData",
"actiontrail:GetGovernanceMetrics"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "mscsub:ListSubscriptionItems",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"yundun-sas:GetModuleConfigStatus",
"yundun-aegis:DescribeAccesskeyLeakList",
"yundun-sas:DescribeGroupedVul",
"yundun-sas:DescribeCheckWarningSummary",
"yundun-sas:DescribeSuspEvents"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"bssapi:QuerySavingsPlansInstance"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ims:ListUserBasicInfos",
"ims:ListAccessKeys",
"actiontrail:GetAccessKeyLastUsedProducts",
"actiontrail:GetAccessKeyLastUsedInfo"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"yundun-antiddosbag:DescribeInstanceSummary",
"yundun-antiddosbag:DescribeInstanceList",
"yundun-antiddosbag:DescribePackIpList",
"yundun-ddoscoo:DescribeDomains",
"yundun-ddoscoo:DescribeWebCcProtectSwitch"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"yundun-cloudfirewall:DescribeUserBuyVersion",
"yundun-cloudfirewall:DescribeAssetStatistic",
"yundun-cloudfirewall:DescribeUserBandwithDetail",
"yundun-cloudfirewall:DescribeAssetList",
"yundun-cloudfirewall:DescribeNatFirewallList",
"yundun-cloudfirewall:DescribeVpcFirewallSummaryInfo",
"yundun-cloudfirewall:DescribeDefaultIPSConfig",
"yundun-cloudfirewall:DescribeAclStats",
"yundun-cloudfirewall:DescribeControlPolicy",
"yundun-cloudfirewall:DescribeLogStoreInfo",
"yundun-cloudfirewall:DescribeVpcFirewallList",
"yundun-cloudfirewall:DescribeVpcFirewallCenList",
"yundun-cloudfirewall:DescribeTrFirewallsV2List",
"yundun-cloudfirewall:DescribeVpcInstanceList",
"yundun-cloudfirewall:DescribeTrFirewallsV2Detail"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"resourcecenter:ExecuteSQLQuery",
"resourcecenter:SearchMultiAccountResources",
"resourcecenter:GetMultiAccountResourceCenterServiceStatus",
"resourcecenter:ExecuteMultiAccountSQLQuery",
"resourcecenter:EnableMultiAccountResourceCenter",
"resourcemanager:ListTrustedServiceStatus",
"resourcemanager:ListMessageContacts",
"resourcemanager:ListDelegatedAdministrators"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ecs:EnableInsight",
"ecs:DescribeInsightStatus",
"ecs:DescribeInsightChecks",
"ecs:DescribeInsightCheckItems",
"ecs:DescribeInsightSummaries"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"accessanalyzer:CreateAnalyzer",
"accessanalyzer:GetAnalyzer",
"accessanalyzer:ListAnalyzers",
"accessanalyzer:DeleteAnalyzer",
"accessanalyzer:ListFindings",
"accessanalyzer:GetFinding"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"dcdn:ListSites",
"dcdn:ListSiteDeliveryTasks",
"dcdn:ListWafRules",
"dcdn:ListRecords",
"dcdn:ListCertificatesByRecord",
"dcdn:ListSiteFunctions"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"esa:ListSites",
"esa:ListSiteDeliveryTasks",
"esa:ListWafRules",
"esa:ListRecords",
"esa:ListCertificatesByRecord",
"esa:ListSiteFunctions"
],
"Resource": "*"
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "ecsinsight.aliyuncs.com"
}
}
},
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "accessanalyzer.aliyuncs.com"
}
}
}
],
"Version": "1"
}
相关文档
文档内容是否对您有帮助?