AliyunServiceRolePolicyForSFMAccessACK

更新时间:
复制为 MD 格式

AliyunServiceRolePolicyForSFMAccessACK 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForSFMAccessACK 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。

策略详情

  • 类型:系统策略

  • 创建时间:2026-01-27 11:11:47

  • 更新时间:2026-01-27 11:11:47

  • 当前版本:v1

策略内容

{
  "Version": "1",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "cs:CheckControlPlaneLogEnable",
        "cs:CheckServiceRole",
        "cs:DeployPolicyInstance",
        "cs:DescribeClusterEvents",
        "cs:DescribeClusterLogs",
        "cs:DescribeClusterNodePoolDetail",
        "cs:DescribeClusterNodePools",
        "cs:DescribeClusterNodes",
        "cs:DescribeClusterResources",
        "cs:DescribeKubernetesVersionMetadata",
        "cs:DescribeSubaccountK8sClusterUserConfig",
        "cs:DescribeTrigger",
        "cs:DescribeUserClusterNamespaces",
        "cs:DescribeUserQuota",
        "cs:GetClusterAddonInstance",
        "cs:GetKubernetesTrigger",
        "cs:GetUserPermissions",
        "cs:ListClusterKubeconfigStates",
        "cs:AttachInstancesToNodePool",
        "cs:CreateCluster",
        "cs:CreateClusterNodePool",
        "cs:CreateKubernetesTrigger",
        "cs:CreateTrigger",
        "cs:ListUserKubeConfigStates",
        "cs:ModifyCluster",
        "cs:ModifyClusterAddon",
        "cs:ModifyClusterNodePool",
        "cs:OpenAckService",
        "cs:DescribeClustersForRegion",
        "cs:ListClusterAddonInstanceResources"
      ],
      "Resource": "*"
    },
    {
      "Action": "ram:DeleteServiceLinkedRole",
      "Resource": "*",
      "Effect": "Allow",
      "Condition": {
        "StringEquals": {
          "ram:ServiceName": "ack-access.sfm.aliyuncs.com"
        }
      }
    }
  ]
}

相关文档