Difference between revisions of "AWS managed policy: AdministratorAccess"
Jump to navigation
Jump to search
(36 intermediate revisions by 6 users not shown) | |||
Line 1: | Line 1: | ||
− | + | Do not provide access to change [[AWS support]] plans. | |
− | + | * <code>[[arn:aws:iam]]::aws:[[policy]]/AdministratorAccess</code> | |
== Related terms == | == Related terms == | ||
− | * [[root]] | + | * [[Default usernames]]: <code>[[root]]</code> |
− | + | * <code>[[aws iam list-attached-user-policies --user-name]]</code> | |
+ | * <code>[[AmazonEKSClusterPolicy]]</code> | ||
+ | * [[AWS managed policies]]: <code>[[ReadOnlyAccess]], [[ViewOnlyAccess]], [[SecurityAudit]]</code> | ||
+ | * [[AWS roles]]: <code>[[AdministratorRole]], [[OrganizationAccountAccessRole]]</code> | ||
+ | * [[List of AWS policies]] | ||
+ | * <code>[[IAMUserChangePassword]]</code> | ||
+ | * <code>[[arn:aws:iam::123456789012:root]]</code> | ||
+ | * <code>[[AWSControlTowerAdmin]]</code> | ||
+ | * <code>[[PowerUserAccess]]</code> | ||
+ | * [[AmazonECS_FullAccess]] | ||
+ | * <code>[[Detect when the AdministratorAccess policy is attached to an AWS IAM user. (Datadog)]]</code> | ||
+ | == See also == | ||
+ | * {{AWS managed policies}} | ||
+ | * {{AWS roles}} | ||
− | + | [[Category:AWS]] | |
− |
Latest revision as of 09:06, 27 June 2024
Do not provide access to change AWS support plans.
arn:aws:iam::aws:policy/AdministratorAccess
Related terms[edit]
- Default usernames:
root
aws iam list-attached-user-policies --user-name
AmazonEKSClusterPolicy
- AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, SecurityAudit
- AWS roles:
AdministratorRole, OrganizationAccountAccessRole
- List of AWS policies
IAMUserChangePassword
arn:aws:iam::123456789012:root
AWSControlTowerAdmin
PowerUserAccess
- AmazonECS_FullAccess
Detect when the AdministratorAccess policy is attached to an AWS IAM user. (Datadog)
See also[edit]
- AWS managed policies:
ReadOnlyAccess, ViewOnlyAccess, AdministratorAccess, SecurityAudit, ViewBilling, AmazonEKSClusterPolicy
, List of AWS policies - AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
Advertising: