Skip to content
This repository has been archived by the owner on Jul 26, 2020. It is now read-only.

Latest commit

 

History

History
85 lines (66 loc) · 2.44 KB

aws-iam.org

File metadata and controls

85 lines (66 loc) · 2.44 KB

AWS IAM

Table of Contents

Policy

Id

  • An optional identifier
  • Using a UUID for the value is recommended
  • Services like SQS or SNS might require this
"Id": "cd3ad3d9-2776-4ef1-a904-4c229d1642ee"

Statement

  • Required
  • Contains an array of individual statements
"Statement": [{...},{...},{...}]

Effect

  • Either Allow or Deny

Sid

  • An optional identifier
  • The Sid value must be unique within a policy
"Sid": "1"

Principal

Action

Resource

Not-

NotPrincipal, NotAction, NotResource are dvanced policy elements that explicitly matches everything except the specified list of the elements.

Condition

img/screenshot_2017-04-22_23-50-50.png

"Condition" :  {
      "DateGreaterThan" : {
         "aws:CurrentTime" : "2013-08-16T12:00:00Z"
       },
      "DateLessThan": {
         "aws:CurrentTime" : "2013-08-16T15:00:00Z"
       },
       "IpAddress" : {
          "aws:SourceIp" : ["192.0.2.0/24", "203.0.113.0/24"]
      }
}

The two values for aws:SourceIp are evaluated using OR. The three separate condition operators are evaluated using AND.

Concepts

Roles

img/screenshot_2017-04-22_22-38-40.png

Policies Evaluation Logic

img/screenshot_2017-02-19_14-05-01.png

The enforcement code evaluates all user-based and resource-based policies that are applicable to the request(based on the resource, principal, action, and conditions). The order in which the enforcement code evaluates the policies is not important.

img/screenshot_2017-02-19_14-06-20.png