Difference between revisions of "AWS policy"
Jump to navigation
Jump to search
Line 2: | Line 2: | ||
* <code>[[iam]]:ChangePassword</code> (Policy) | * <code>[[iam]]:ChangePassword</code> (Policy) | ||
* <code>[[AmazonS3FullAccess]]</code> | * <code>[[AmazonS3FullAccess]]</code> | ||
+ | * <code>[[AmazonRoute53FullAccess]]</code> | ||
* <code>[[AmazonDynamoDBFullAccess]]</code> | * <code>[[AmazonDynamoDBFullAccess]]</code> | ||
* <code>[[AmazonInspectorReadOnlyAccess]]</code> | * <code>[[AmazonInspectorReadOnlyAccess]]</code> |
Revision as of 05:51, 15 September 2022
iam:ChangePassword
(Policy)AmazonS3FullAccess
AmazonRoute53FullAccess
AmazonDynamoDBFullAccess
AmazonInspectorReadOnlyAccess
AmazonInspector2ReadOnlyAccess
ReadOnlyAccess
ClientVPNServiceRolePolicy
ClientVPNServiceConnectionsRolePolicy
Errors
Cannot attach a Service Role Policy to a Customer Role.
An error occurred (NoSuchBucketPolicy) when calling the GetBucketPolicy operation: The bucket policy does not exist
Type
aws iam policy commands
aws iam create-policy
aws iam list-policies
aws iam list-attached-user-policies --user-name
aws iam list-group-policies
aws iam list-role-policies
aws iam put-group-policy
aws iam put-role-policy
aws iam put-user-policy
aws iam attach-role-policy
aws iam attach-group-policy
Related terms
- AWS Role:
OrganizationAccountAccessRole
- AWS managed policy: AmazonS3ReadOnlyAcces
- Terraform resources:
aws_iam_policy
- Resource-based policies and Identity-based policies
- List of AWS policies
See also
- AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, AdministratorAccess, SecurityAudit, ViewBilling, AmazonEKSClusterPolicy
, List of AWS policies - AWS policies: managed policies, AWS trust policy, AWS Service Control Policy (SCP), Resource-based policies, Identity-based policies,
"Resource":
, Job function, AWS Policy Generator,s3:, lambda:, cloudwatch:
Advertising: