AWS政策可以使用AWS Identity and Access Management(IAM)来实施限制。以下是一个示例IAM策略,用于限制在一个地区创建所有资源,并在其他地区只能进行只读操作:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ec2:Describe*",
"iam:Get*",
"iam:List*",
"s3:Get*",
"s3:List*",
"rds:Describe*",
"rds:List*"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"ec2:RunInstances",
"ec2:TerminateInstances",
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:RebootInstances",
"rds:Create*",
"rds:Delete*",
"s3:Put*"
],
"Condition": {
"StringEquals": {
"aws:RequestedRegion": "us-west-2"
}
},
"Resource": "*"
},
{
"Effect": "Deny",
"Action": [
"ec2:RunInstances",
"ec2:TerminateInstances",
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:RebootInstances",
"rds:Create*",
"rds:Delete*",
"s3:Put*"
],
"NotCondition": {
"StringEquals": {
"aws:RequestedRegion": "us-west-2"
}
},
"Resource": "*"
}
]
}
上述策略包含三个部分:
请根据您的具体需求和地区设置修改该策略。
下一篇:AWS政策资源中的名称前缀