跳至内容

IAM policy for EC2

0

Please provide me a sample for AWS IAM policy regarding EC2 for restart only

已提问 3 个月前68 查看次数
2 回答
5
已接受的回答

Take this:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowRebootEC2Instances",
      "Effect": "Allow",
      "Action": "ec2:RebootInstances",
      "Resource": "*"
    },
    {
      "Sid": "DenyOtherEC2Actions",
      "Effect": "Deny",
      "Action": [
        "ec2:StartInstances",
        "ec2:StopInstances",
        "ec2:TerminateInstances",
        "ec2:ModifyInstanceAttribute"
      ],
      "Resource": "*"
    }
  ]
}
专家
已回答 3 个月前
AWS
专家
已审核 3 个月前
1

Here's a sample IAM policy that grants permissions to restart (stop and start) EC2 instances:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:StartInstances",
"ec2:StopInstances"
],
"Resource": "*"
}
]
}

This policy allows the user, group, or role it's attached to perform only the StartInstances and StopInstances actions on any EC2 instance.

If you want to restrict this permission to specific instances, you can modify the Resource element to specify the ARNs of those instances.

For more granular control, you could also implement tag-based access control. For example, you could create a policy that only allows users to start or stop instances that have the same "CostCenter" tag value as the user attempting the action.
Sources
Identity-based policies for Amazon EC2 - Amazon Elastic Compute Cloud
EC2: Start or stop instances based on matching principal and resource tags - AWS Identity and Access Management

已回答 3 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。