Examples of using Resource-based policy in English and their translations into Spanish
{-}
-
Colloquial
-
Official
Although AWS CodePipeline doesn't support resource-based policies, it does store artifacts to be used in pipelines in versioned S3 buckets.
You may choose to use resource-based policies, user policies,
For example, any queue-based policies in Amazon SQS or resource-based policies in Amazon S3 are automatically updated to use the new name and path.
Some AWS resources support resource-based policies, and these policies provide another mechanism to define permissions that affect temporary security credentials.
With resource-based policies you can specify who has access to the resource
You can attach resource-based policies directly to a resource,
Some AWS resources support resource-based policies, and these policies provide another mechanism to grant permissions directly to a federated user.
Review the permissions for services that use resource-based policies or that support other security mechanisms.
The principal_block element is required in resource-based policies(for example, in Amazon S3 bucket policies) and in trust policies for IAM roles.
The id_block is allowed in resource-based policies, but not in identity-based policies. .
To create resource-based policies for intents that you associate with a Lambda function,
For resource-based policies, you specify the user,
You can use resource-based policies to manage secret access
CloudWatch Logs supports resource-based policies for destinations, which you can use to enable cross account subscriptions.
Resource-based policies are inline policies, and there are no managed resource-based policies.
To see which services support resource-based policies, see AWS Services That Work with IAM.
The capabilities controlled by resource-based policies vary depending on the resource type,
For those services that support resource-based policies, you can identify the principal in the Principal element of a policy attached to the resource.
These are called resource-based policies, and you can use them to grant principals in another AWS account access to the resource.
see Identity-Based Policies and Resource-Based Policies.
