Last active
March 3, 2022 09:33
-
-
Save takezoux2/f98c0aa73f1147a8d73beee6e6aee650 to your computer and use it in GitHub Desktop.
2022/3/3時点のAWS Managed Policyの一覧 https://qiita.com/takezoux2/items/3fac52de848aaa92b8f6
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"PolicyName": "FMSServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/FMSServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonSQSFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonSQSFullAccess" | |
}, | |
{ | |
"PolicyName": "AmazonEC2RoleforSSM", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM" | |
}, | |
{ | |
"PolicyName": "AWSXrayWriteOnlyAccess", | |
"Arn": "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess" | |
}, | |
{ | |
"PolicyName": "AutoScalingServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AutoScalingServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "ViewOnlyAccess", | |
"Arn": "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess" | |
}, | |
{ | |
"PolicyName": "AmazonEC2ContainerRegistryFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryFullAccess" | |
}, | |
{ | |
"PolicyName": "AmazonS3FullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonS3FullAccess" | |
}, | |
{ | |
"PolicyName": "AmazonEC2ContainerRegistryReadOnly", | |
"Arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly" | |
}, | |
{ | |
"PolicyName": "CloudWatchAgentServerPolicy", | |
"Arn": "arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy" | |
}, | |
{ | |
"PolicyName": "AWSSSOServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSSSOServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonAPIGatewayPushToCloudWatchLogs", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs" | |
}, | |
{ | |
"PolicyName": "AWSDataPipelineRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AWSDataPipelineRole" | |
}, | |
{ | |
"PolicyName": "ReadOnlyAccess", | |
"Arn": "arn:aws:iam::aws:policy/ReadOnlyAccess" | |
}, | |
{ | |
"PolicyName": "AWSElasticLoadBalancingServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSElasticLoadBalancingServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "ElastiCacheServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ElastiCacheServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSXRayDaemonWriteAccess", | |
"Arn": "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess" | |
}, | |
{ | |
"PolicyName": "AWSCloudFrontLogger", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCloudFrontLogger" | |
}, | |
{ | |
"PolicyName": "AmazonRDSServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonRDSServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSOrganizationsServiceTrustPolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSOrganizationsServiceTrustPolicy" | |
}, | |
{ | |
"PolicyName": "AWSGlueServiceRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AWSGlueServiceRole" | |
}, | |
{ | |
"PolicyName": "AmazonEC2ContainerServiceEventsRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceEventsRole" | |
}, | |
{ | |
"PolicyName": "AmazonEC2ContainerServiceAutoscaleRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceAutoscaleRole" | |
}, | |
{ | |
"PolicyName": "AmazonECSServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonECSServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AdministratorAccess", | |
"Arn": "arn:aws:iam::aws:policy/AdministratorAccess" | |
}, | |
{ | |
"PolicyName": "AmazonSSMServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonSSMServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonSSMManagedInstanceCore", | |
"Arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" | |
}, | |
{ | |
"PolicyName": "AWSDataLifecycleManagerServiceRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRole" | |
}, | |
{ | |
"PolicyName": "CloudWatchLogsReadOnlyAccess", | |
"Arn": "arn:aws:iam::aws:policy/CloudWatchLogsReadOnlyAccess" | |
}, | |
{ | |
"PolicyName": "AmazonEC2RoleforDataPipelineRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforDataPipelineRole" | |
}, | |
{ | |
"PolicyName": "CloudWatchLogsFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/CloudWatchLogsFullAccess" | |
}, | |
{ | |
"PolicyName": "AmazonEC2SpotFleetTaggingRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2SpotFleetTaggingRole" | |
}, | |
{ | |
"PolicyName": "AmazonECS_FullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonECS_FullAccess" | |
}, | |
{ | |
"PolicyName": "AWSSupportServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSApplicationAutoscalingRDSClusterPolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingRDSClusterPolicy" | |
}, | |
{ | |
"PolicyName": "AmazonElasticsearchServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonElasticsearchServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSCloud9ServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCloud9ServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSApplicationAutoscalingECSServicePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingECSServicePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonECSTaskExecutionRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSTrustedAdvisorServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSTrustedAdvisorServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonEC2ContainerServiceforEC2Role", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role" | |
}, | |
{ | |
"PolicyName": "AmazonESFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonESFullAccess" | |
}, | |
{ | |
"PolicyName": "AWSLambdaBasicExecutionRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" | |
}, | |
{ | |
"PolicyName": "AWSApplicationAutoscalingDynamoDBTablePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingDynamoDBTablePolicy" | |
}, | |
{ | |
"PolicyName": "APIGatewayServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSConfigServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSConfigServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonRDSEnhancedMonitoringRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole" | |
}, | |
{ | |
"PolicyName": "AWSLambdaVPCAccessExecutionRole", | |
"Arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" | |
}, | |
{ | |
"PolicyName": "AmazonSNSFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonSNSFullAccess" | |
}, | |
{ | |
"PolicyName": "PowerUserAccess", | |
"Arn": "arn:aws:iam::aws:policy/PowerUserAccess" | |
}, | |
{ | |
"PolicyName": "WAFV2LoggingServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/WAFV2LoggingServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSAppMeshServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSAppMeshServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSCodeStarNotificationsServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCodeStarNotificationsServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AccessAnalyzerServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AccessAnalyzerServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSGlobalAcceleratorSLRPolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSGlobalAcceleratorSLRPolicy" | |
}, | |
{ | |
"PolicyName": "AmazonSSMPatchAssociation", | |
"Arn": "arn:aws:iam::aws:policy/AmazonSSMPatchAssociation" | |
}, | |
{ | |
"PolicyName": "AmazonOpenSearchServiceFullAccess", | |
"Arn": "arn:aws:iam::aws:policy/AmazonOpenSearchServiceFullAccess" | |
}, | |
{ | |
"PolicyName": "ServiceQuotasServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ServiceQuotasServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonElasticFileSystemServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonElasticFileSystemServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "ComputeOptimizerServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ComputeOptimizerServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSChatbotServiceLinkedRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSChatbotServiceLinkedRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonDevOpsGuruServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonDevOpsGuruServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "AmazonOpenSearchServiceRolePolicy", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonOpenSearchServiceRolePolicy" | |
}, | |
{ | |
"PolicyName": "CloudWatch-CrossAccountAccess", | |
"Arn": "arn:aws:iam::aws:policy/aws-service-role/CloudWatch-CrossAccountAccess" | |
}, | |
{ | |
"PolicyName": "AWSAppMeshEnvoyAccess", | |
"Arn": "arn:aws:iam::aws:policy/AWSAppMeshEnvoyAccess" | |
} | |
] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment