跳至內容

IAM policy for EC2

0

Please provide me a sample for AWS IAM policy regarding EC2 for restart only

已提問 3 個月前檢視次數 68 次
2 個答案
5
已接受的答案

Take this:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowRebootEC2Instances",
      "Effect": "Allow",
      "Action": "ec2:RebootInstances",
      "Resource": "*"
    },
    {
      "Sid": "DenyOtherEC2Actions",
      "Effect": "Deny",
      "Action": [
        "ec2:StartInstances",
        "ec2:StopInstances",
        "ec2:TerminateInstances",
        "ec2:ModifyInstanceAttribute"
      ],
      "Resource": "*"
    }
  ]
}
專家
已回答 3 個月前
AWS
專家
已審閱 3 個月前
1

Here's a sample IAM policy that grants permissions to restart (stop and start) EC2 instances:

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:StartInstances",
"ec2:StopInstances"
],
"Resource": "*"
}
]
}

This policy allows the user, group, or role it's attached to perform only the StartInstances and StopInstances actions on any EC2 instance.

If you want to restrict this permission to specific instances, you can modify the Resource element to specify the ARNs of those instances.

For more granular control, you could also implement tag-based access control. For example, you could create a policy that only allows users to start or stop instances that have the same "CostCenter" tag value as the user attempting the action.
Sources
Identity-based policies for Amazon EC2 - Amazon Elastic Compute Cloud
EC2: Start or stop instances based on matching principal and resource tags - AWS Identity and Access Management

已回答 3 個月前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。