- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
IAM policies define the privileges granted to users, groups, or roles. Best practice recommends granting only the permissions necessary to perform specific tasks. First, identify what users need to accomplish, and then create policies that allow them to perform only those tasks. It’s more secure to start with minimal permissions and add more as needed than to begin with overly permissive settings and restrict them later. Granting full administrative privileges instead of essential permissions can expose resources to potential misuse or compromise. Policies that have a statement with "Effect": "Allow"
combined with "Action": "*"
over "Resource": "*"
should be removed.
Lists all IAM users, groups, and roles that the specified managed policy is attached to.
aws iam list-entities-for-policy --policy-arn <policy_arn>
Detach the policy from all IAM users:
aws iam detach-user-policy --user-name <iam_user> --policy-arn <policy_arn>
Detach the policy from all IAM groups:
aws iam detach-group-policy --group-name <iam_group> --policy-arn <policy_arn>
Detach the policy from all IAM roles:
aws iam detach-role-policy --role-name <iam_role> --policy-arn <policy_arn>