Skip to content

Instantly share code, notes, and snippets.

@takezoux2
Last active March 3, 2022 09:33
Show Gist options
  • Save takezoux2/f98c0aa73f1147a8d73beee6e6aee650 to your computer and use it in GitHub Desktop.
Save takezoux2/f98c0aa73f1147a8d73beee6e6aee650 to your computer and use it in GitHub Desktop.
2022/3/3時点のAWS Managed Policyの一覧 https://qiita.com/takezoux2/items/3fac52de848aaa92b8f6
[
{
"PolicyName": "FMSServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/FMSServiceRolePolicy"
},
{
"PolicyName": "AmazonSQSFullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonSQSFullAccess"
},
{
"PolicyName": "AmazonEC2RoleforSSM",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM"
},
{
"PolicyName": "AWSXrayWriteOnlyAccess",
"Arn": "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess"
},
{
"PolicyName": "AutoScalingServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AutoScalingServiceRolePolicy"
},
{
"PolicyName": "ViewOnlyAccess",
"Arn": "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess"
},
{
"PolicyName": "AmazonEC2ContainerRegistryFullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryFullAccess"
},
{
"PolicyName": "AmazonS3FullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonS3FullAccess"
},
{
"PolicyName": "AmazonEC2ContainerRegistryReadOnly",
"Arn": "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
},
{
"PolicyName": "CloudWatchAgentServerPolicy",
"Arn": "arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy"
},
{
"PolicyName": "AWSSSOServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSSSOServiceRolePolicy"
},
{
"PolicyName": "AmazonAPIGatewayPushToCloudWatchLogs",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonAPIGatewayPushToCloudWatchLogs"
},
{
"PolicyName": "AWSDataPipelineRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AWSDataPipelineRole"
},
{
"PolicyName": "ReadOnlyAccess",
"Arn": "arn:aws:iam::aws:policy/ReadOnlyAccess"
},
{
"PolicyName": "AWSElasticLoadBalancingServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSElasticLoadBalancingServiceRolePolicy"
},
{
"PolicyName": "ElastiCacheServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ElastiCacheServiceRolePolicy"
},
{
"PolicyName": "AWSXRayDaemonWriteAccess",
"Arn": "arn:aws:iam::aws:policy/AWSXRayDaemonWriteAccess"
},
{
"PolicyName": "AWSCloudFrontLogger",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCloudFrontLogger"
},
{
"PolicyName": "AmazonRDSServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonRDSServiceRolePolicy"
},
{
"PolicyName": "AWSOrganizationsServiceTrustPolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSOrganizationsServiceTrustPolicy"
},
{
"PolicyName": "AWSGlueServiceRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AWSGlueServiceRole"
},
{
"PolicyName": "AmazonEC2ContainerServiceEventsRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceEventsRole"
},
{
"PolicyName": "AmazonEC2ContainerServiceAutoscaleRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceAutoscaleRole"
},
{
"PolicyName": "AmazonECSServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonECSServiceRolePolicy"
},
{
"PolicyName": "AdministratorAccess",
"Arn": "arn:aws:iam::aws:policy/AdministratorAccess"
},
{
"PolicyName": "AmazonSSMServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonSSMServiceRolePolicy"
},
{
"PolicyName": "AmazonSSMManagedInstanceCore",
"Arn": "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
},
{
"PolicyName": "AWSDataLifecycleManagerServiceRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRole"
},
{
"PolicyName": "CloudWatchLogsReadOnlyAccess",
"Arn": "arn:aws:iam::aws:policy/CloudWatchLogsReadOnlyAccess"
},
{
"PolicyName": "AmazonEC2RoleforDataPipelineRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforDataPipelineRole"
},
{
"PolicyName": "CloudWatchLogsFullAccess",
"Arn": "arn:aws:iam::aws:policy/CloudWatchLogsFullAccess"
},
{
"PolicyName": "AmazonEC2SpotFleetTaggingRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2SpotFleetTaggingRole"
},
{
"PolicyName": "AmazonECS_FullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonECS_FullAccess"
},
{
"PolicyName": "AWSSupportServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy"
},
{
"PolicyName": "AWSApplicationAutoscalingRDSClusterPolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingRDSClusterPolicy"
},
{
"PolicyName": "AmazonElasticsearchServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonElasticsearchServiceRolePolicy"
},
{
"PolicyName": "AWSCloud9ServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCloud9ServiceRolePolicy"
},
{
"PolicyName": "AWSApplicationAutoscalingECSServicePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingECSServicePolicy"
},
{
"PolicyName": "AmazonECSTaskExecutionRolePolicy",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
},
{
"PolicyName": "AWSTrustedAdvisorServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSTrustedAdvisorServiceRolePolicy"
},
{
"PolicyName": "AmazonEC2ContainerServiceforEC2Role",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role"
},
{
"PolicyName": "AmazonESFullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonESFullAccess"
},
{
"PolicyName": "AWSLambdaBasicExecutionRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole"
},
{
"PolicyName": "AWSApplicationAutoscalingDynamoDBTablePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationAutoscalingDynamoDBTablePolicy"
},
{
"PolicyName": "APIGatewayServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/APIGatewayServiceRolePolicy"
},
{
"PolicyName": "AWSConfigServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSConfigServiceRolePolicy"
},
{
"PolicyName": "AmazonRDSEnhancedMonitoringRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole"
},
{
"PolicyName": "AWSLambdaVPCAccessExecutionRole",
"Arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole"
},
{
"PolicyName": "AmazonSNSFullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonSNSFullAccess"
},
{
"PolicyName": "PowerUserAccess",
"Arn": "arn:aws:iam::aws:policy/PowerUserAccess"
},
{
"PolicyName": "WAFV2LoggingServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/WAFV2LoggingServiceRolePolicy"
},
{
"PolicyName": "AWSAppMeshServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSAppMeshServiceRolePolicy"
},
{
"PolicyName": "AWSCodeStarNotificationsServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSCodeStarNotificationsServiceRolePolicy"
},
{
"PolicyName": "AccessAnalyzerServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AccessAnalyzerServiceRolePolicy"
},
{
"PolicyName": "AWSGlobalAcceleratorSLRPolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSGlobalAcceleratorSLRPolicy"
},
{
"PolicyName": "AmazonSSMPatchAssociation",
"Arn": "arn:aws:iam::aws:policy/AmazonSSMPatchAssociation"
},
{
"PolicyName": "AmazonOpenSearchServiceFullAccess",
"Arn": "arn:aws:iam::aws:policy/AmazonOpenSearchServiceFullAccess"
},
{
"PolicyName": "ServiceQuotasServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ServiceQuotasServiceRolePolicy"
},
{
"PolicyName": "AmazonElasticFileSystemServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonElasticFileSystemServiceRolePolicy"
},
{
"PolicyName": "ComputeOptimizerServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/ComputeOptimizerServiceRolePolicy"
},
{
"PolicyName": "AWSChatbotServiceLinkedRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSChatbotServiceLinkedRolePolicy"
},
{
"PolicyName": "AmazonDevOpsGuruServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonDevOpsGuruServiceRolePolicy"
},
{
"PolicyName": "AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy"
},
{
"PolicyName": "AmazonOpenSearchServiceRolePolicy",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/AmazonOpenSearchServiceRolePolicy"
},
{
"PolicyName": "CloudWatch-CrossAccountAccess",
"Arn": "arn:aws:iam::aws:policy/aws-service-role/CloudWatch-CrossAccountAccess"
},
{
"PolicyName": "AWSAppMeshEnvoyAccess",
"Arn": "arn:aws:iam::aws:policy/AWSAppMeshEnvoyAccess"
}
]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment