-
Notifications
You must be signed in to change notification settings - Fork 2
/
automation-roles.yml
390 lines (388 loc) · 11.5 KB
/
automation-roles.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
AWSTemplateFormatVersion: '2010-09-09'
Resources:
AttachIAMToInstanceRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-AttachIAMToInstance
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: ec2:AssociateIamInstanceProfile
Effect: Allow
Resource: '*'
- Action: iam:GetInstanceProfile
Effect: Allow
Resource: '*'
- Action: ec2:DisassociateIamInstanceProfile
Effect: Allow
Resource: '*'
- Action: iam:AddRoleToInstanceProfile
Effect: Allow
Resource: '*'
- Action: ec2:DescribeIamInstanceProfileAssociations
Effect: Allow
Resource: '*'
- Action: iam:CreateInstanceProfile
Effect: Allow
Resource: '*'
- Action: iam:ListInstanceProfilesForRole
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-AttachIAMToInstance
RoleName: SSMAutomationAttachIAMToInstanceRole
Type: AWS::IAM::Role
ConfigureS3BucketLoggingRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-ConfigureS3BucketLogging
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: s3:PutBucketLogging
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-ConfigureS3BucketLogging
RoleName: SSMAutomationConfigureS3BucketLoggingRole
Type: AWS::IAM::Role
ConfigureS3BucketVersioningRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-ConfigureS3BucketVersioning
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: s3:PutBucketVersioning
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-ConfigureS3BucketVersioning
RoleName: SSMAutomationConfigureS3BucketVersioningRole
Type: AWS::IAM::Role
CreateSnapshotRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-CreateSnapshot
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: ec2:CreateSnapshot
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-CreateSnapshot
RoleName: SSMAutomationCreateSnapshotRole
Type: AWS::IAM::Role
DeleteDynamoDbBackupRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-DeleteDynamoDbBackup
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: dynamodb:DeleteBackup
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-DeleteDynamoDbBackup
RoleName: SSMAutomationDeleteDynamoDbBackupRole
Type: AWS::IAM::Role
DeleteSnapshotRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-DeleteSnapshot
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: ec2:DeleteSnapshot
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-DeleteSnapshot
RoleName: SSMAutomationDeleteSnapshotRole
Type: AWS::IAM::Role
DisablePublicAccessForSecurityGroupRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-DisablePublicAccessForSecurityGroup
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: ec2:RevokeSecurityGroupIngress
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-DisablePublicAccessForSecurityGroup
RoleName: SSMAutomationDisablePublicAccessForSecurityGroupRole
Type: AWS::IAM::Role
DisableS3BucketPublicReadWriteRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-DisableS3BucketPublicReadWrite
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: s3:PutBucketAcl
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-DisableS3BucketPublicReadWrite
RoleName: SSMAutomationDisableS3BucketPublicReadWriteRole
Type: AWS::IAM::Role
EnableCloudTrailRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-EnableCloudTrail
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: cloudtrail:CreateTrail
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-EnableCloudTrail
RoleName: SSMAutomationEnableCloudTrailRole
Type: AWS::IAM::Role
EnableS3BucketEncryptionRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-EnableS3BucketEncryption
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: s3:PutBucketEncryption
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-EnableS3BucketEncryption
RoleName: SSMAutomationEnableS3BucketEncryptionRole
Type: AWS::IAM::Role
PublishSNSNotificationRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-PublishSNSNotification
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: sns:Publish
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-PublishSNSNotification
RoleName: SSMAutomationPublishSNSNotificationRole
Type: AWS::IAM::Role
RebootRdsInstanceRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-RebootRdsInstance
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: rds:RebootDBInstance
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-RebootRdsInstance
RoleName: SSMAutomationRebootRdsInstanceRole
Type: AWS::IAM::Role
ReleaseElasticIPRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-ReleaseElasticIP
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: ec2:ReleaseAddress
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-ReleaseElasticIP
RoleName: SSMAutomationReleaseElasticIPRole
Type: AWS::IAM::Role
ResizeInstanceRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-ResizeInstance
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: EC2:ModifyInstanceAttribute
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-ResizeInstance
RoleName: SSMAutomationResizeInstanceRole
Type: AWS::IAM::Role
StartRdsInstanceRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-StartRdsInstance
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: rds:StartDBInstance
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-StartRdsInstance
RoleName: SSMAutomationStartRdsInstanceRole
Type: AWS::IAM::Role
StopRdsInstanceRole:
Properties:
AssumeRolePolicyDocument:
Statement:
- Action:
- sts:AssumeRole
Effect: Allow
Principal:
Service:
- ssm.amazonaws.com
Version: '2012-10-17'
Description: SSM Automation Role for Document AWS-StopRdsInstance
MaxSessionDuration: '43200'
Policies:
- PolicyDocument:
Statement:
- Action: rds:StopDBInstance
Effect: Allow
Resource: '*'
Version: '2012-10-17'
PolicyName: AWS-StopRdsInstance
RoleName: SSMAutomationStopRdsInstanceRole
Type: AWS::IAM::Role