AmazonECS_FullAccess - AWS Política gestionada

Las traducciones son generadas a través de traducción automática. En caso de conflicto entre la traducción y la version original de inglés, prevalecerá la version en inglés.

AmazonECS_FullAccess

Descripción: Proporciona acceso administrativo a los recursos de Amazon ECS y habilita las funciones de ECS mediante el acceso a otros recursos de AWS servicio VPCs, incluidos los grupos y CloudFormation pilas de Auto Scaling.

AmazonECS_FullAccess es una política administrada de AWS.

Uso de la política

Puede asociar AmazonECS_FullAccess a los usuarios, grupos y roles.

Información de la política

  • Tipo: política AWS gestionada

  • Hora de creación: 7 de noviembre de 2017 a las 21:36 UTC

  • Hora de edición: 13 de agosto de 2024 a las 19:39 h UTC

  • ARN: arn:aws:iam::aws:policy/AmazonECS_FullAccess

Versión de la política

Versión de la política: v21 (predeterminado)

La versión predeterminada de la política define qué permisos tendrá. Cuando un usuario o un rol con la política solicita el acceso a un AWS recurso, AWS comprueba la versión predeterminada de la política para determinar si permite la solicitud.

Documento de política JSON

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "ECSIntegrationsManagementPolicy", "Effect" : "Allow", "Action" : [ "application-autoscaling:DeleteScalingPolicy", "application-autoscaling:DeregisterScalableTarget", "application-autoscaling:DescribeScalableTargets", "application-autoscaling:DescribeScalingActivities", "application-autoscaling:DescribeScalingPolicies", "application-autoscaling:PutScalingPolicy", "application-autoscaling:RegisterScalableTarget", "appmesh:DescribeVirtualGateway", "appmesh:DescribeVirtualNode", "appmesh:ListMeshes", "appmesh:ListVirtualGateways", "appmesh:ListVirtualNodes", "autoscaling:CreateAutoScalingGroup", "autoscaling:CreateLaunchConfiguration", "autoscaling:DeleteAutoScalingGroup", "autoscaling:DeleteLaunchConfiguration", "autoscaling:Describe*", "autoscaling:UpdateAutoScalingGroup", "cloudformation:CreateStack", "cloudformation:DeleteStack", "cloudformation:DescribeStack*", "cloudformation:UpdateStack", "cloudwatch:DeleteAlarms", "cloudwatch:DescribeAlarms", "cloudwatch:GetMetricStatistics", "cloudwatch:PutMetricAlarm", "codedeploy:BatchGetApplicationRevisions", "codedeploy:BatchGetApplications", "codedeploy:BatchGetDeploymentGroups", "codedeploy:BatchGetDeployments", "codedeploy:ContinueDeployment", "codedeploy:CreateApplication", "codedeploy:CreateDeployment", "codedeploy:CreateDeploymentGroup", "codedeploy:GetApplication", "codedeploy:GetApplicationRevision", "codedeploy:GetDeployment", "codedeploy:GetDeploymentConfig", "codedeploy:GetDeploymentGroup", "codedeploy:GetDeploymentTarget", "codedeploy:ListApplicationRevisions", "codedeploy:ListApplications", "codedeploy:ListDeploymentConfigs", "codedeploy:ListDeploymentGroups", "codedeploy:ListDeployments", "codedeploy:ListDeploymentTargets", "codedeploy:RegisterApplicationRevision", "codedeploy:StopDeployment", "ec2:AssociateRouteTable", "ec2:AttachInternetGateway", "ec2:AuthorizeSecurityGroupIngress", "ec2:CancelSpotFleetRequests", "ec2:CreateInternetGateway", "ec2:CreateLaunchTemplate", "ec2:CreateRoute", "ec2:CreateRouteTable", "ec2:CreateSecurityGroup", "ec2:CreateSubnet", "ec2:CreateVpc", "ec2:DeleteLaunchTemplate", "ec2:DeleteSubnet", "ec2:DeleteVpc", "ec2:Describe*", "ec2:DetachInternetGateway", "ec2:DisassociateRouteTable", "ec2:ModifySubnetAttribute", "ec2:ModifyVpcAttribute", "ec2:RequestSpotFleet", "ec2:RunInstances", "ecs:*", "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticloadbalancing:CreateListener", "elasticloadbalancing:CreateLoadBalancer", "elasticloadbalancing:CreateRule", "elasticloadbalancing:CreateTargetGroup", "elasticloadbalancing:DeleteListener", "elasticloadbalancing:DeleteLoadBalancer", "elasticloadbalancing:DeleteRule", "elasticloadbalancing:DeleteTargetGroup", "elasticloadbalancing:DescribeListeners", "elasticloadbalancing:DescribeLoadBalancers", "elasticloadbalancing:DescribeRules", "elasticloadbalancing:DescribeTargetGroups", "events:DeleteRule", "events:DescribeRule", "events:ListRuleNamesByTarget", "events:ListTargetsByRule", "events:PutRule", "events:PutTargets", "events:RemoveTargets", "fsx:DescribeFileSystems", "iam:ListAttachedRolePolicies", "iam:ListInstanceProfiles", "iam:ListRoles", "lambda:ListFunctions", "logs:CreateLogGroup", "logs:DescribeLogGroups", "logs:FilterLogEvents", "route53:CreateHostedZone", "route53:DeleteHostedZone", "route53:GetHealthCheck", "route53:GetHostedZone", "route53:ListHostedZonesByName", "servicediscovery:CreatePrivateDnsNamespace", "servicediscovery:CreateService", "servicediscovery:DeleteService", "servicediscovery:GetNamespace", "servicediscovery:GetOperation", "servicediscovery:GetService", "servicediscovery:ListNamespaces", "servicediscovery:ListServices", "servicediscovery:UpdateService", "sns:ListTopics" ], "Resource" : [ "*" ] }, { "Sid" : "SSMPolicy", "Effect" : "Allow", "Action" : [ "ssm:GetParameter", "ssm:GetParameters", "ssm:GetParametersByPath" ], "Resource" : "arn:aws:ssm:*:*:parameter/aws/service/ecs*" }, { "Sid" : "ManagedCloudformationResourcesCleanupPolicy", "Effect" : "Allow", "Action" : [ "ec2:DeleteInternetGateway", "ec2:DeleteRoute", "ec2:DeleteRouteTable", "ec2:DeleteSecurityGroup" ], "Resource" : [ "*" ], "Condition" : { "StringLike" : { "ec2:ResourceTag/aws:cloudformation:stack-name" : "EC2ContainerService-*" } } }, { "Sid" : "TasksPassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : "ecs-tasks.amazonaws.com" } } }, { "Sid" : "InfrastructurePassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsInfrastructureRole" ], "Condition" : { "StringEquals" : { "iam:PassedToService" : "ecs.amazonaws.com" } } }, { "Sid" : "InstancePassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsInstanceRole*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : [ "ec2.amazonaws.com", "ec2.amazonaws.com.cn" ] } } }, { "Sid" : "AutoScalingPassRolePolicy", "Action" : "iam:PassRole", "Effect" : "Allow", "Resource" : [ "arn:aws:iam::*:role/ecsAutoscaleRole*" ], "Condition" : { "StringLike" : { "iam:PassedToService" : [ "application-autoscaling.amazonaws.com", "application-autoscaling.amazonaws.com.cn" ] } } }, { "Sid" : "ServiceLinkedRoleCreationPolicy", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringLike" : { "iam:AWSServiceName" : [ "ecs.amazonaws.com", "autoscaling.amazonaws.com", "ecs.application-autoscaling.amazonaws.com", "spot.amazonaws.com", "spotfleet.amazonaws.com" ] } } }, { "Sid" : "ELBTaggingPolicy", "Effect" : "Allow", "Action" : [ "elasticloadbalancing:AddTags" ], "Resource" : "*", "Condition" : { "StringEquals" : { "elasticloadbalancing:CreateAction" : [ "CreateTargetGroup", "CreateRule", "CreateListener", "CreateLoadBalancer" ] } } } ] }

Más información