This article introduces some commonly used system default policies to help you understand and use system policies for permission control more quickly.
IAM identities (IAM users, user groups, roles) that are authorized by this policy can obtain administrative privileges for products that support all IAM capabilities, such as ECSFullAccess, VPCFullAccess, IAMFullAccess, and so on.
{ "Statement": [ { "Effect": "Allow", "Action": [ "*" ], "Resource": [ "*" ] } ] }
After being authorized for this policy, IAM identities (IAM users, user groups, roles) can obtain read-only access to all IAM-enabled products, such as ECSReadOnlyAccess, VPCReadOnlyAccess, IAMReadOnlyAccess, and so on.
{ "Statement": [ { "Effect": "Allow", "Action": [ "*:*Describe*", "*:List*", "*:Get*", "*:Query*", "*:Check*", "*:Read*", "*:Desc*", "*:Search*", "tos:Head*", "rms:*Get*", "rtc:Find*", "cloud_trail:Lookup*" ], "Resource": [ "*" ] } ] }
After being authorized for this policy, the IAM identity (IAM user, user group, role) can obtain read-only access to Access Control (IAM), and can enter the Access Control Console to view access control-related information, excluding the viewing permission of the Secret Access Key.
{ "Statement": [ { "Effect": "Allow", "Action": [ "iam:Get*", "iam:ListUser*", "iam:ListRole*", "iam:ListGroup*", "iam:ListPolicy*", "iam:ListSAML*", "iam:ListIdentity*", "iam:ListProject*", "iam:ListAccount*", "iam:ListAttach*", "iam:ListVirtualMFADevices", "iam:ListThirdParty*", "iam:ListConsole*", "iam:ListService*", "iam:ListPlatformIdentity*", "iam:ListCategory*", "iam:ListSystem*", "iam:ListEntities*", "iam:ListIDP*", "iam:ListAccessKeys*", "iam:ListPolicies*", "iam:ListAppID*", "iam:ListResource*", "iam:ListTag*" ], "Resource": [ "*" ] } ] }
IAM identities (IAM users, user groups, roles) that are authorized to this policy gain full administrative access control (IAM) privileges.
{ "Statement": [ { "Effect": "Allow", "Action": [ "iam:*" ], "Resource": [ "*" ] } ] }
This policy allows IAM users to manage only their own API access keys, including key creation, deletion, status modification, key list query, and console access to secret access keys.
{ "Statement": [ { "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:DeleteAccessKey", "iam:UpdateAccessKey", "iam:ListAccessKeys", "iam:ListSecretKeys" ], "Resource": [ "trn:iam::*:user/${volc:UserName}" ] } ] }
This policy allows IAM users to manage the API access keys of all IAM users, including key creation, deletion, status modification, key list query, and console access to secret access keys.
{ "Statement": [ { "Effect": "Allow", "Action": [ "iam:CreateAccessKey", "iam:DeleteAccessKey", "iam:ListAccessKeys", "iam:UpdateAccessKey", "iam:ListSecretKeys" ], "Resource": [ "*" ] } ] }
This policy allows IAM users to query the API Access Key of any IAM user, including the ability to query the list of keys and the console to view the Secret Access Key.
{ "Statement": [ { "Effect": "Allow", "Action": [ "iam:ListAccessKeys", "iam:ListSecretKeys" ], "Resource": [ "*" ] } ] }
The IAM identity (IAM user, user group, role) authorized by this policy can obtain content related to the label service in the management account, such as searching by label.
{ "Statement": [ { "Effect": "Allow", "Action": [ "tag:*" ], "Resource": [ "*" ] } ] }