Example de IAM Policies
Trust - Comptes de l'organisation
Permettre à tous les compte de mon organisation d'assumer un role
JSON |
---|
| "Statement": [{
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": "sts:AssumeRole",
"Condition": {
"StringEquals": {
"sts:ExternalId": "ext-id",
"aws:PrincipalOrgID": "organisation-id"
}
}
}]
|
Permettre Accès à un S3 avec clé KMS
JSON |
---|
| {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "*",
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:ListBucket",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::BUCKET_ID",
"arn:aws:s3:::BUCKET_ID/*"
]
},
{
"Effect": "Allow",
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:GenerateDataKey"
],
"Resource": "arn:aws:kms:ca-central-1:123456789012:key/ddddddd-aaaa-bbbb-cccc-1234567890"
}
]
}
|