내용으로 건너뛰기

IAM policy for EC2

0

Please provide me a sample for AWS IAM policy regarding EC2 for restart only

질문됨 3달 전68회 조회
2개 답변
5
수락된 답변

Take this:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowRebootEC2Instances",
      "Effect": "Allow",
      "Action": "ec2:RebootInstances",
      "Resource": "*"
    },
    {
      "Sid": "DenyOtherEC2Actions",
      "Effect": "Deny",
      "Action": [
        "ec2:StartInstances",
        "ec2:StopInstances",
        "ec2:TerminateInstances",
        "ec2:ModifyInstanceAttribute"
      ],
      "Resource": "*"
    }
  ]
}
전문가
답변함 3달 전
AWS
전문가
검토됨 3달 전
1

Here's a sample IAM policy that grants permissions to restart (stop and start) EC2 instances:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:StartInstances",
"ec2:StopInstances"
],
"Resource": "*"
}
]
}

This policy allows the user, group, or role it's attached to perform only the StartInstances and StopInstances actions on any EC2 instance.

If you want to restrict this permission to specific instances, you can modify the Resource element to specify the ARNs of those instances.

For more granular control, you could also implement tag-based access control. For example, you could create a policy that only allows users to start or stop instances that have the same "CostCenter" tag value as the user attempting the action.
Sources
Identity-based policies for Amazon EC2 - Amazon Elastic Compute Cloud
EC2: Start or stop instances based on matching principal and resource tags - AWS Identity and Access Management

답변함 3달 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.