FIAM-COMMON-IAMBasics.json 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. {
  2. "Version": "2012-10-17",
  3. "Statement": [
  4. {
  5. "Sid": "RequirePermissionsBoundary",
  6. "Effect": "Allow",
  7. "Action": [
  8. "iam:DetachRolePolicy",
  9. "iam:CreateRole",
  10. "iam:AttachRolePolicy"
  11. ],
  12. "Resource": "arn:aws:iam::${account}:role/$${aws:PrincipalTag/IAM:NamePrefix}*",
  13. "Condition": {
  14. "StringEquals": {
  15. "iam:PermissionsBoundary": "arn:aws:iam::${account}:policy/$${aws:PrincipalTag/IAM:PermissionsBoundary}"
  16. }
  17. }
  18. },
  19. {
  20. "Sid": "DeleteAppropriatelyNamedRole",
  21. "Effect": "Allow",
  22. "Action": "iam:DeleteRole",
  23. "Resource": "arn:aws:iam::${account}:role/$${aws:PrincipalTag/IAM:NamePrefix}*"
  24. },
  25. {
  26. "Sid": "ModifyAppropriatelyNamedPolicies",
  27. "Effect": "Allow",
  28. "Action": [
  29. "iam:CreatePolicy",
  30. "iam:DeletePolicy",
  31. "iam:CreatePolicyVersion",
  32. "iam:DeletePolicyVersion"
  33. ],
  34. "Resource": "arn:aws:iam::${account}:policy/$${aws:PrincipalTag/IAM:NamePrefix}**"
  35. },
  36. {
  37. "Sid": "AdditionalUsefulAccessTODO",
  38. "Effect": "Allow",
  39. "Action": [
  40. "iam:Get*",
  41. "iam:List*",
  42. "iam:GenerateServiceLastAccessedDetails"
  43. ],
  44. "Resource": "*"
  45. }
  46. ]
  47. }