Sample IAM Ploicy for multiple

{
“Version”: “2012-10-17”,
“Statement”: [ {
“Sid”: “Read access through console”,
“Effect”: “Allow”,
“Action”: [
“datapipeline:ListPipelines”,
“datapipeline:GetAccountLimits”,
“cloudwatch:*”,
“dynamodb:DescribeTable”,
“elasticmapreduce:AddJobFlowSteps”,
“elasticmapreduce:ListInstance*”,
“iam:AddRoleToInstanceProfile”,
“iam:CreateInstanceProfile”,
“iam:GetInstanceProfile”,
“iam:GetRole”,
“iam:ListInstanceProfiles”,
“iam:ListInstanceProfilesForRole”,
“iam:ListRoles”,
“iam:PassRole”,
“rds:DescribeDBInstances”,
“rds:DescribeDBSecurityGroups”,
“redshift:DescribeClusters”,
“redshift:DescribeClusterSecurityGroups”,
“s3:List*”,
“sns:ListTopics”
],
“Resource”: [
“*”
]
},
{
“Sid”: “Write access to user’s own DataPipelines”,
“Effect”: “Allow”,
“Action”: [
“datapipeline:*”
],
“Resource”: [
“*”
],
“Condition”: {
“StringEquals”: {
“datapipeline:PipelineCreator”: “${aws:userid}”
}
}
}
]
}

Leave a comment