kms_ebs_key_policy.json.tpl 1.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
  1. {
  2. "Id": "key-consolepolicy-3",
  3. "Version": "2012-10-17",
  4. "Statement": [
  5. {
  6. "Sid": "Enable IAM User Permissions",
  7. "Effect": "Allow",
  8. "Principal": {
  9. "AWS": [ "arn:aws:iam::${account}:root" ]
  10. },
  11. "Action": "kms:*",
  12. "Resource": "*"
  13. },
  14. {
  15. "Sid": "Allow use of the key",
  16. "Effect": "Allow",
  17. "Principal": {
  18. "AWS": [
  19. "arn:aws:iam::${account}:role/aws-service-role/spot.amazonaws.com/AWSServiceRoleForEC2Spot",
  20. "arn:aws:iam::${account}:role/aws-service-role/spotfleet.amazonaws.com/AWSServiceRoleForEC2SpotFleet"
  21. ]
  22. },
  23. "Action": [
  24. "kms:Encrypt",
  25. "kms:Decrypt",
  26. "kms:ReEncrypt*",
  27. "kms:GenerateDataKey*",
  28. "kms:DescribeKey"
  29. ],
  30. "Resource": "*"
  31. },
  32. {
  33. "Sid": "Allow attachment of persistent resources",
  34. "Effect": "Allow",
  35. "Principal": {
  36. "AWS": [
  37. "arn:aws:iam::${account}:role/aws-service-role/spot.amazonaws.com/AWSServiceRoleForEC2Spot",
  38. "arn:aws:iam::${account}:role/aws-service-role/spotfleet.amazonaws.com/AWSServiceRoleForEC2SpotFleet"
  39. ]
  40. },
  41. "Action": [
  42. "kms:CreateGrant",
  43. "kms:ListGrants",
  44. "kms:RevokeGrant"
  45. ],
  46. "Resource": "*",
  47. "Condition": {
  48. "Bool": {
  49. "kms:GrantIsForAWSResource": "true"
  50. }
  51. }
  52. }
  53. ]
  54. }