diff --git a/samtranslator/internal/data/aws_managed_policies.json b/samtranslator/internal/data/aws_managed_policies.json index 163b5b600..46def1bdb 100644 --- a/samtranslator/internal/data/aws_managed_policies.json +++ b/samtranslator/internal/data/aws_managed_policies.json @@ -6,6 +6,9 @@ "AWSAccountManagementReadOnlyAccess": "arn:aws:iam::aws:policy/AWSAccountManagementReadOnlyAccess", "AWSAccountUsageReportAccess": "arn:aws:iam::aws:policy/AWSAccountUsageReportAccess", "AWSAgentlessDiscoveryService": "arn:aws:iam::aws:policy/AWSAgentlessDiscoveryService", + "AWSAppFabricFullAccess": "arn:aws:iam::aws:policy/AWSAppFabricFullAccess", + "AWSAppFabricReadOnlyAccess": "arn:aws:iam::aws:policy/AWSAppFabricReadOnlyAccess", + "AWSAppFabricServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSAppFabricServiceRolePolicy", "AWSAppMeshEnvoyAccess": "arn:aws:iam::aws:policy/AWSAppMeshEnvoyAccess", "AWSAppMeshFullAccess": "arn:aws:iam::aws:policy/AWSAppMeshFullAccess", "AWSAppMeshPreviewEnvoyAccess": "arn:aws:iam::aws:policy/AWSAppMeshPreviewEnvoyAccess", @@ -47,9 +50,12 @@ "AWSApplicationMigrationReadOnlyAccess": "arn:aws:iam::aws:policy/AWSApplicationMigrationReadOnlyAccess", "AWSApplicationMigrationReplicationServerPolicy": "arn:aws:iam::aws:policy/service-role/AWSApplicationMigrationReplicationServerPolicy", "AWSApplicationMigrationSSMAccess": "arn:aws:iam::aws:policy/AWSApplicationMigrationSSMAccess", + "AWSApplicationMigrationServiceEc2InstancePolicy": "arn:aws:iam::aws:policy/AWSApplicationMigrationServiceEc2InstancePolicy", "AWSApplicationMigrationServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSApplicationMigrationServiceRolePolicy", "AWSApplicationMigrationVCenterClientPolicy": "arn:aws:iam::aws:policy/AWSApplicationMigrationVCenterClientPolicy", "AWSArtifactAccountSync": "arn:aws:iam::aws:policy/service-role/AWSArtifactAccountSync", + "AWSArtifactReportsReadOnlyAccess": "arn:aws:iam::aws:policy/AWSArtifactReportsReadOnlyAccess", + "AWSArtifactServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSArtifactServiceRolePolicy", "AWSAuditManagerAdministratorAccess": "arn:aws:iam::aws:policy/AWSAuditManagerAdministratorAccess", "AWSAuditManagerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSAuditManagerServiceRolePolicy", "AWSAutoScalingPlansEC2AutoScalingPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSAutoScalingPlansEC2AutoScalingPolicy", @@ -88,6 +94,8 @@ "AWSChatbotServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSChatbotServiceLinkedRolePolicy", "AWSCleanRoomsFullAccess": "arn:aws:iam::aws:policy/AWSCleanRoomsFullAccess", "AWSCleanRoomsFullAccessNoQuerying": "arn:aws:iam::aws:policy/AWSCleanRoomsFullAccessNoQuerying", + "AWSCleanRoomsMLFullAccess": "arn:aws:iam::aws:policy/AWSCleanRoomsMLFullAccess", + "AWSCleanRoomsMLReadOnlyAccess": "arn:aws:iam::aws:policy/AWSCleanRoomsMLReadOnlyAccess", "AWSCleanRoomsReadOnlyAccess": "arn:aws:iam::aws:policy/AWSCleanRoomsReadOnlyAccess", "AWSCloud9Administrator": "arn:aws:iam::aws:policy/AWSCloud9Administrator", "AWSCloud9EnvironmentMember": "arn:aws:iam::aws:policy/AWSCloud9EnvironmentMember", @@ -141,13 +149,16 @@ "AWSConfigServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSConfigServiceRolePolicy", "AWSConfigUserAccess": "arn:aws:iam::aws:policy/AWSConfigUserAccess", "AWSConnector": "arn:aws:iam::aws:policy/AWSConnector", + "AWSControlTowerAccountServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSControlTowerAccountServiceRolePolicy", "AWSControlTowerServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AWSControlTowerServiceRolePolicy", "AWSCostAndUsageReportAutomationPolicy": "arn:aws:iam::aws:policy/service-role/AWSCostAndUsageReportAutomationPolicy", "AWSDMSFleetAdvisorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSDMSFleetAdvisorServiceRolePolicy", + "AWSDMSServerlessServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSDMSServerlessServiceRolePolicy", "AWSDataExchangeFullAccess": "arn:aws:iam::aws:policy/AWSDataExchangeFullAccess", "AWSDataExchangeProviderFullAccess": "arn:aws:iam::aws:policy/AWSDataExchangeProviderFullAccess", "AWSDataExchangeReadOnly": "arn:aws:iam::aws:policy/AWSDataExchangeReadOnly", "AWSDataExchangeSubscriberFullAccess": "arn:aws:iam::aws:policy/AWSDataExchangeSubscriberFullAccess", + "AWSDataLifecycleManagerSSMFullAccess": "arn:aws:iam::aws:policy/service-role/AWSDataLifecycleManagerSSMFullAccess", "AWSDataLifecycleManagerServiceRole": "arn:aws:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRole", "AWSDataLifecycleManagerServiceRoleForAMIManagement": "arn:aws:iam::aws:policy/service-role/AWSDataLifecycleManagerServiceRoleForAMIManagement", "AWSDataPipeline_FullAccess": "arn:aws:iam::aws:policy/AWSDataPipeline_FullAccess", @@ -198,10 +209,14 @@ "AWSElasticDisasterRecoveryAgentInstallationPolicy": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryAgentInstallationPolicy", "AWSElasticDisasterRecoveryAgentPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryAgentPolicy", "AWSElasticDisasterRecoveryConsoleFullAccess": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryConsoleFullAccess", + "AWSElasticDisasterRecoveryConsoleFullAccess_v2": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryConsoleFullAccess_v2", "AWSElasticDisasterRecoveryConversionServerPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryConversionServerPolicy", + "AWSElasticDisasterRecoveryCrossAccountReplicationPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryCrossAccountReplicationPolicy", "AWSElasticDisasterRecoveryEc2InstancePolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryEc2InstancePolicy", "AWSElasticDisasterRecoveryFailbackInstallationPolicy": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryFailbackInstallationPolicy", "AWSElasticDisasterRecoveryFailbackPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryFailbackPolicy", + "AWSElasticDisasterRecoveryLaunchActionsPolicy": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryLaunchActionsPolicy", + "AWSElasticDisasterRecoveryNetworkReplicationPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryNetworkReplicationPolicy", "AWSElasticDisasterRecoveryReadOnlyAccess": "arn:aws:iam::aws:policy/AWSElasticDisasterRecoveryReadOnlyAccess", "AWSElasticDisasterRecoveryRecoveryInstancePolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryRecoveryInstancePolicy", "AWSElasticDisasterRecoveryReplicationServerPolicy": "arn:aws:iam::aws:policy/service-role/AWSElasticDisasterRecoveryReplicationServerPolicy", @@ -216,11 +231,15 @@ "AWSElementalMediaLiveReadOnly": "arn:aws:iam::aws:policy/AWSElementalMediaLiveReadOnly", "AWSElementalMediaPackageFullAccess": "arn:aws:iam::aws:policy/AWSElementalMediaPackageFullAccess", "AWSElementalMediaPackageReadOnly": "arn:aws:iam::aws:policy/AWSElementalMediaPackageReadOnly", + "AWSElementalMediaPackageV2FullAccess": "arn:aws:iam::aws:policy/AWSElementalMediaPackageV2FullAccess", + "AWSElementalMediaPackageV2ReadOnly": "arn:aws:iam::aws:policy/AWSElementalMediaPackageV2ReadOnly", "AWSElementalMediaStoreFullAccess": "arn:aws:iam::aws:policy/AWSElementalMediaStoreFullAccess", "AWSElementalMediaStoreReadOnly": "arn:aws:iam::aws:policy/AWSElementalMediaStoreReadOnly", "AWSElementalMediaTailorFullAccess": "arn:aws:iam::aws:policy/AWSElementalMediaTailorFullAccess", "AWSElementalMediaTailorReadOnly": "arn:aws:iam::aws:policy/AWSElementalMediaTailorReadOnly", "AWSEnhancedClassicNetworkingMangementPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSEnhancedClassicNetworkingMangementPolicy", + "AWSEntityResolutionConsoleFullAccess": "arn:aws:iam::aws:policy/AWSEntityResolutionConsoleFullAccess", + "AWSEntityResolutionConsoleReadOnlyAccess": "arn:aws:iam::aws:policy/AWSEntityResolutionConsoleReadOnlyAccess", "AWSFMAdminFullAccess": "arn:aws:iam::aws:policy/AWSFMAdminFullAccess", "AWSFMAdminReadOnlyAccess": "arn:aws:iam::aws:policy/AWSFMAdminReadOnlyAccess", "AWSFMMemberReadOnlyAccess": "arn:aws:iam::aws:policy/AWSFMMemberReadOnlyAccess", @@ -230,7 +249,9 @@ "AWSFaultInjectionSimulatorNetworkAccess": "arn:aws:iam::aws:policy/service-role/AWSFaultInjectionSimulatorNetworkAccess", "AWSFaultInjectionSimulatorRDSAccess": "arn:aws:iam::aws:policy/service-role/AWSFaultInjectionSimulatorRDSAccess", "AWSFaultInjectionSimulatorSSMAccess": "arn:aws:iam::aws:policy/service-role/AWSFaultInjectionSimulatorSSMAccess", + "AWSFinSpaceServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSFinSpaceServiceRolePolicy", "AWSForWordPressPluginPolicy": "arn:aws:iam::aws:policy/AWSForWordPressPluginPolicy", + "AWSGitSyncServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSGitSyncServiceRolePolicy", "AWSGlobalAcceleratorSLRPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSGlobalAcceleratorSLRPolicy", "AWSGlueConsoleFullAccess": "arn:aws:iam::aws:policy/AWSGlueConsoleFullAccess", "AWSGlueConsoleSageMakerNotebookFullAccess": "arn:aws:iam::aws:policy/AWSGlueConsoleSageMakerNotebookFullAccess", @@ -242,12 +263,16 @@ "AWSGrafanaAccountAdministrator": "arn:aws:iam::aws:policy/AWSGrafanaAccountAdministrator", "AWSGrafanaConsoleReadOnlyAccess": "arn:aws:iam::aws:policy/AWSGrafanaConsoleReadOnlyAccess", "AWSGrafanaWorkspacePermissionManagement": "arn:aws:iam::aws:policy/AWSGrafanaWorkspacePermissionManagement", + "AWSGrafanaWorkspacePermissionManagementV2": "arn:aws:iam::aws:policy/AWSGrafanaWorkspacePermissionManagementV2", "AWSGreengrassFullAccess": "arn:aws:iam::aws:policy/AWSGreengrassFullAccess", "AWSGreengrassReadOnlyAccess": "arn:aws:iam::aws:policy/AWSGreengrassReadOnlyAccess", "AWSGreengrassResourceAccessRolePolicy": "arn:aws:iam::aws:policy/service-role/AWSGreengrassResourceAccessRolePolicy", "AWSGroundStationAgentInstancePolicy": "arn:aws:iam::aws:policy/AWSGroundStationAgentInstancePolicy", "AWSHealthFullAccess": "arn:aws:iam::aws:policy/AWSHealthFullAccess", + "AWSHealthImagingFullAccess": "arn:aws:iam::aws:policy/AWSHealthImagingFullAccess", + "AWSHealthImagingReadOnlyAccess": "arn:aws:iam::aws:policy/AWSHealthImagingReadOnlyAccess", "AWSHealth_EventProcessorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSHealth_EventProcessorServiceRolePolicy", + "AWSIAMIdentityCenterAllowListForIdentityContext": "arn:aws:iam::aws:policy/AWSIAMIdentityCenterAllowListForIdentityContext", "AWSIPAMServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSIPAMServiceRolePolicy", "AWSIQContractServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSIQContractServiceRolePolicy", "AWSIQFullAccess": "arn:aws:iam::aws:policy/AWSIQFullAccess", @@ -258,6 +283,7 @@ "AWSImageBuilderReadOnlyAccess": "arn:aws:iam::aws:policy/AWSImageBuilderReadOnlyAccess", "AWSImportExportFullAccess": "arn:aws:iam::aws:policy/AWSImportExportFullAccess", "AWSImportExportReadOnlyAccess": "arn:aws:iam::aws:policy/AWSImportExportReadOnlyAccess", + "AWSIncidentManagerIncidentAccessServiceRolePolicy": "arn:aws:iam::aws:policy/AWSIncidentManagerIncidentAccessServiceRolePolicy", "AWSIncidentManagerResolverAccess": "arn:aws:iam::aws:policy/AWSIncidentManagerResolverAccess", "AWSIncidentManagerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSIncidentManagerServiceRolePolicy", "AWSIoT1ClickFullAccess": "arn:aws:iam::aws:policy/AWSIoT1ClickFullAccess", @@ -290,6 +316,7 @@ "AWSIoTSiteWiseMonitorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSIoTSiteWiseMonitorServiceRolePolicy", "AWSIoTSiteWiseReadOnlyAccess": "arn:aws:iam::aws:policy/AWSIoTSiteWiseReadOnlyAccess", "AWSIoTThingsRegistration": "arn:aws:iam::aws:policy/service-role/AWSIoTThingsRegistration", + "AWSIoTTwinMakerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSIoTTwinMakerServiceRolePolicy", "AWSIoTWirelessDataAccess": "arn:aws:iam::aws:policy/AWSIoTWirelessDataAccess", "AWSIoTWirelessFullAccess": "arn:aws:iam::aws:policy/AWSIoTWirelessFullAccess", "AWSIoTWirelessFullPublishAccess": "arn:aws:iam::aws:policy/AWSIoTWirelessFullPublishAccess", @@ -324,11 +351,13 @@ "AWSLicenseManagerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerServiceRolePolicy", "AWSLicenseManagerUserSubscriptionsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSLicenseManagerUserSubscriptionsServiceRolePolicy", "AWSM2ServicePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSM2ServicePolicy", + "AWSMSKReplicatorExecutionRole": "arn:aws:iam::aws:policy/service-role/AWSMSKReplicatorExecutionRole", "AWSManagedServicesDeploymentToolkitPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSManagedServicesDeploymentToolkitPolicy", "AWSManagedServices_ContactsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSManagedServices_ContactsServiceRolePolicy", "AWSManagedServices_DetectiveControlsConfig_ServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSManagedServices_DetectiveControlsConfig_ServiceRolePolicy", "AWSManagedServices_EventsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSManagedServices_EventsServiceRolePolicy", "AWSMarketplaceAmiIngestion": "arn:aws:iam::aws:policy/AWSMarketplaceAmiIngestion", + "AWSMarketplaceDeploymentServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSMarketplaceDeploymentServiceRolePolicy", "AWSMarketplaceFullAccess": "arn:aws:iam::aws:policy/AWSMarketplaceFullAccess", "AWSMarketplaceGetEntitlements": "arn:aws:iam::aws:policy/AWSMarketplaceGetEntitlements", "AWSMarketplaceImageBuildFullAccess": "arn:aws:iam::aws:policy/AWSMarketplaceImageBuildFullAccess", @@ -352,6 +381,7 @@ "AWSMigrationHubOrchestratorPlugin": "arn:aws:iam::aws:policy/AWSMigrationHubOrchestratorPlugin", "AWSMigrationHubOrchestratorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSMigrationHubOrchestratorServiceRolePolicy", "AWSMigrationHubRefactorSpaces-EnvironmentsWithoutBridgesFullAccess": "arn:aws:iam::aws:policy/AWSMigrationHubRefactorSpaces-EnvironmentsWithoutBridgesFullAccess", + "AWSMigrationHubRefactorSpaces-SSMAutomationPolicy": "arn:aws:iam::aws:policy/service-role/AWSMigrationHubRefactorSpaces-SSMAutomationPolicy", "AWSMigrationHubRefactorSpacesFullAccess": "arn:aws:iam::aws:policy/AWSMigrationHubRefactorSpacesFullAccess", "AWSMigrationHubRefactorSpacesServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSMigrationHubRefactorSpacesServiceRolePolicy", "AWSMigrationHubSMSAccess": "arn:aws:iam::aws:policy/service-role/AWSMigrationHubSMSAccess", @@ -413,11 +443,14 @@ "AWSReachabilityAnalyzerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSReachabilityAnalyzerServiceRolePolicy", "AWSRefactoringToolkitFullAccess": "arn:aws:iam::aws:policy/AWSRefactoringToolkitFullAccess", "AWSRefactoringToolkitSidecarPolicy": "arn:aws:iam::aws:policy/AWSRefactoringToolkitSidecarPolicy", + "AWSRepostSpaceSupportOperationsPolicy": "arn:aws:iam::aws:policy/AWSRepostSpaceSupportOperationsPolicy", + "AWSResilienceHubAsssessmentExecutionPolicy": "arn:aws:iam::aws:policy/AWSResilienceHubAsssessmentExecutionPolicy", "AWSResourceAccessManagerFullAccess": "arn:aws:iam::aws:policy/AWSResourceAccessManagerFullAccess", "AWSResourceAccessManagerReadOnlyAccess": "arn:aws:iam::aws:policy/AWSResourceAccessManagerReadOnlyAccess", "AWSResourceAccessManagerResourceShareParticipantAccess": "arn:aws:iam::aws:policy/AWSResourceAccessManagerResourceShareParticipantAccess", "AWSResourceAccessManagerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSResourceAccessManagerServiceRolePolicy", "AWSResourceExplorerFullAccess": "arn:aws:iam::aws:policy/AWSResourceExplorerFullAccess", + "AWSResourceExplorerOrganizationsAccess": "arn:aws:iam::aws:policy/AWSResourceExplorerOrganizationsAccess", "AWSResourceExplorerReadOnlyAccess": "arn:aws:iam::aws:policy/AWSResourceExplorerReadOnlyAccess", "AWSResourceExplorerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSResourceExplorerServiceRolePolicy", "AWSResourceGroupsReadOnlyAccess": "arn:aws:iam::aws:policy/AWSResourceGroupsReadOnlyAccess", @@ -426,6 +459,7 @@ "AWSRoboMakerServiceRolePolicy": "arn:aws:iam::aws:policy/AWSRoboMakerServiceRolePolicy", "AWSRoboMaker_FullAccess": "arn:aws:iam::aws:policy/AWSRoboMaker_FullAccess", "AWSRolesAnywhereServicePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSRolesAnywhereServicePolicy", + "AWSS3OnOutpostsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSS3OnOutpostsServiceRolePolicy", "AWSSSMForSAPServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSSSMForSAPServiceLinkedRolePolicy", "AWSSSMOpsInsightsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSSSMOpsInsightsServiceRolePolicy", "AWSSSODirectoryAdministrator": "arn:aws:iam::aws:policy/AWSSSODirectoryAdministrator", @@ -451,6 +485,7 @@ "AWSServiceCatalogSyncServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceCatalogSyncServiceRolePolicy", "AWSServiceRoleForAmazonEKSNodegroup": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForAmazonEKSNodegroup", "AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCloudWatchAlarmsActionSSMServiceRolePolicy", + "AWSServiceRoleForCloudWatchMetrics_DbPerfInsightsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCloudWatchMetrics_DbPerfInsightsServiceRolePolicy", "AWSServiceRoleForCodeGuru-Profiler": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCodeGuru-Profiler", "AWSServiceRoleForCodeWhispererPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForCodeWhispererPolicy", "AWSServiceRoleForEC2ScheduledInstances": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForEC2ScheduledInstances", @@ -459,8 +494,10 @@ "AWSServiceRoleForIoTSiteWise": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForIoTSiteWise", "AWSServiceRoleForLogDeliveryPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForLogDeliveryPolicy", "AWSServiceRoleForMonitronPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForMonitronPolicy", + "AWSServiceRoleForNeptuneGraphPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForNeptuneGraphPolicy", "AWSServiceRoleForSMS": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRoleForSMS", "AWSServiceRolePolicyForBackupReports": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRolePolicyForBackupReports", + "AWSServiceRolePolicyForBackupRestoreTesting": "arn:aws:iam::aws:policy/aws-service-role/AWSServiceRolePolicyForBackupRestoreTesting", "AWSShieldDRTAccessPolicy": "arn:aws:iam::aws:policy/service-role/AWSShieldDRTAccessPolicy", "AWSShieldServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSShieldServiceRolePolicy", "AWSStepFunctionsConsoleFullAccess": "arn:aws:iam::aws:policy/AWSStepFunctionsConsoleFullAccess", @@ -518,7 +555,9 @@ "AWSXrayFullAccess": "arn:aws:iam::aws:policy/AWSXrayFullAccess", "AWSXrayReadOnlyAccess": "arn:aws:iam::aws:policy/AWSXrayReadOnlyAccess", "AWSXrayWriteOnlyAccess": "arn:aws:iam::aws:policy/AWSXrayWriteOnlyAccess", + "AWSZonalAutoshiftPracticeRunSLRPolicy": "arn:aws:iam::aws:policy/aws-service-role/AWSZonalAutoshiftPracticeRunSLRPolicy", "AWS_ConfigRole": "arn:aws:iam::aws:policy/service-role/AWS_ConfigRole", + "AWSrePostPrivateCloudWatchAccess": "arn:aws:iam::aws:policy/aws-service-role/AWSrePostPrivateCloudWatchAccess", "AccessAnalyzerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AccessAnalyzerServiceRolePolicy", "AdministratorAccess": "arn:aws:iam::aws:policy/AdministratorAccess", "AdministratorAccess-AWSElasticBeanstalk": "arn:aws:iam::aws:policy/AdministratorAccess-AWSElasticBeanstalk", @@ -543,6 +582,8 @@ "AmazonAugmentedAIFullAccess": "arn:aws:iam::aws:policy/AmazonAugmentedAIFullAccess", "AmazonAugmentedAIHumanLoopFullAccess": "arn:aws:iam::aws:policy/AmazonAugmentedAIHumanLoopFullAccess", "AmazonAugmentedAIIntegratedAPIAccess": "arn:aws:iam::aws:policy/AmazonAugmentedAIIntegratedAPIAccess", + "AmazonBedrockFullAccess": "arn:aws:iam::aws:policy/AmazonBedrockFullAccess", + "AmazonBedrockReadOnly": "arn:aws:iam::aws:policy/AmazonBedrockReadOnly", "AmazonBraketFullAccess": "arn:aws:iam::aws:policy/AmazonBraketFullAccess", "AmazonBraketJobsExecutionPolicy": "arn:aws:iam::aws:policy/AmazonBraketJobsExecutionPolicy", "AmazonBraketServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonBraketServiceRolePolicy", @@ -572,25 +613,36 @@ "AmazonCodeGuruReviewerFullAccess": "arn:aws:iam::aws:policy/AmazonCodeGuruReviewerFullAccess", "AmazonCodeGuruReviewerReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonCodeGuruReviewerReadOnlyAccess", "AmazonCodeGuruReviewerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonCodeGuruReviewerServiceRolePolicy", + "AmazonCodeGuruSecurityFullAccess": "arn:aws:iam::aws:policy/AmazonCodeGuruSecurityFullAccess", + "AmazonCodeGuruSecurityScanAccess": "arn:aws:iam::aws:policy/AmazonCodeGuruSecurityScanAccess", "AmazonCognitoDeveloperAuthenticatedIdentities": "arn:aws:iam::aws:policy/AmazonCognitoDeveloperAuthenticatedIdentities", "AmazonCognitoIdpEmailServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonCognitoIdpEmailServiceRolePolicy", "AmazonCognitoIdpServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonCognitoIdpServiceRolePolicy", "AmazonCognitoPowerUser": "arn:aws:iam::aws:policy/AmazonCognitoPowerUser", "AmazonCognitoReadOnly": "arn:aws:iam::aws:policy/AmazonCognitoReadOnly", + "AmazonCognitoUnAuthedIdentitiesSessionPolicy": "arn:aws:iam::aws:policy/AmazonCognitoUnAuthedIdentitiesSessionPolicy", "AmazonCognitoUnauthenticatedIdentities": "arn:aws:iam::aws:policy/AmazonCognitoUnauthenticatedIdentities", "AmazonConnectCampaignsServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonConnectCampaignsServiceLinkedRolePolicy", "AmazonConnectReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonConnectReadOnlyAccess", "AmazonConnectServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonConnectServiceLinkedRolePolicy", + "AmazonConnectSynchronizationServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonConnectSynchronizationServiceRolePolicy", "AmazonConnectVoiceIDFullAccess": "arn:aws:iam::aws:policy/AmazonConnectVoiceIDFullAccess", "AmazonConnect_FullAccess": "arn:aws:iam::aws:policy/AmazonConnect_FullAccess", "AmazonDMSCloudWatchLogsRole": "arn:aws:iam::aws:policy/service-role/AmazonDMSCloudWatchLogsRole", "AmazonDMSRedshiftS3Role": "arn:aws:iam::aws:policy/service-role/AmazonDMSRedshiftS3Role", "AmazonDMSVPCManagementRole": "arn:aws:iam::aws:policy/service-role/AmazonDMSVPCManagementRole", "AmazonDRSVPCManagement": "arn:aws:iam::aws:policy/AmazonDRSVPCManagement", + "AmazonDataZoneDomainExecutionRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonDataZoneDomainExecutionRolePolicy", + "AmazonDataZoneEnvironmentRolePermissionsBoundary": "arn:aws:iam::aws:policy/AmazonDataZoneEnvironmentRolePermissionsBoundary", + "AmazonDataZoneFullAccess": "arn:aws:iam::aws:policy/AmazonDataZoneFullAccess", + "AmazonDataZoneFullUserAccess": "arn:aws:iam::aws:policy/AmazonDataZoneFullUserAccess", + "AmazonDataZoneGlueManageAccessRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonDataZoneGlueManageAccessRolePolicy", "AmazonDataZonePortalFullAccessPolicy": "arn:aws:iam::aws:policy/AmazonDataZonePortalFullAccessPolicy", "AmazonDataZonePreviewConsoleFullAccess": "arn:aws:iam::aws:policy/AmazonDataZonePreviewConsoleFullAccess", "AmazonDataZoneProjectDeploymentPermissionsBoundary": "arn:aws:iam::aws:policy/AmazonDataZoneProjectDeploymentPermissionsBoundary", "AmazonDataZoneProjectRolePermissionsBoundary": "arn:aws:iam::aws:policy/AmazonDataZoneProjectRolePermissionsBoundary", + "AmazonDataZoneRedshiftGlueProvisioningPolicy": "arn:aws:iam::aws:policy/AmazonDataZoneRedshiftGlueProvisioningPolicy", + "AmazonDataZoneRedshiftManageAccessRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonDataZoneRedshiftManageAccessRolePolicy", "AmazonDetectiveFullAccess": "arn:aws:iam::aws:policy/AmazonDetectiveFullAccess", "AmazonDetectiveInvestigatorAccess": "arn:aws:iam::aws:policy/AmazonDetectiveInvestigatorAccess", "AmazonDetectiveMemberAccess": "arn:aws:iam::aws:policy/AmazonDetectiveMemberAccess", @@ -603,6 +655,8 @@ "AmazonDevOpsGuruServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonDevOpsGuruServiceRolePolicy", "AmazonDocDB-ElasticServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonDocDB-ElasticServiceRolePolicy", "AmazonDocDBConsoleFullAccess": "arn:aws:iam::aws:policy/AmazonDocDBConsoleFullAccess", + "AmazonDocDBElasticFullAccess": "arn:aws:iam::aws:policy/AmazonDocDBElasticFullAccess", + "AmazonDocDBElasticReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonDocDBElasticReadOnlyAccess", "AmazonDocDBFullAccess": "arn:aws:iam::aws:policy/AmazonDocDBFullAccess", "AmazonDocDBReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonDocDBReadOnlyAccess", "AmazonDynamoDBFullAccess": "arn:aws:iam::aws:policy/AmazonDynamoDBFullAccess", @@ -625,9 +679,12 @@ "AmazonEC2RoleforSSM": "arn:aws:iam::aws:policy/service-role/AmazonEC2RoleforSSM", "AmazonEC2SpotFleetAutoscaleRole": "arn:aws:iam::aws:policy/service-role/AmazonEC2SpotFleetAutoscaleRole", "AmazonEC2SpotFleetTaggingRole": "arn:aws:iam::aws:policy/service-role/AmazonEC2SpotFleetTaggingRole", + "AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity": "arn:aws:iam::aws:policy/service-role/AmazonECSInfrastructureRolePolicyForServiceConnectTransportLayerSecurity", + "AmazonECSInfrastructureRolePolicyForVolumes": "arn:aws:iam::aws:policy/service-role/AmazonECSInfrastructureRolePolicyForVolumes", "AmazonECSServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonECSServiceRolePolicy", "AmazonECSTaskExecutionRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy", "AmazonECS_FullAccess": "arn:aws:iam::aws:policy/AmazonECS_FullAccess", + "AmazonEFSCSIDriverPolicy": "arn:aws:iam::aws:policy/service-role/AmazonEFSCSIDriverPolicy", "AmazonEKSClusterPolicy": "arn:aws:iam::aws:policy/AmazonEKSClusterPolicy", "AmazonEKSConnectorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonEKSConnectorServiceRolePolicy", "AmazonEKSFargatePodExecutionRolePolicy": "arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy", @@ -712,7 +769,9 @@ "AmazonHoneycodeTeamAssociationReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonHoneycodeTeamAssociationReadOnlyAccess", "AmazonHoneycodeWorkbookFullAccess": "arn:aws:iam::aws:policy/AmazonHoneycodeWorkbookFullAccess", "AmazonHoneycodeWorkbookReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonHoneycodeWorkbookReadOnlyAccess", + "AmazonInspector2AgentlessServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonInspector2AgentlessServiceRolePolicy", "AmazonInspector2FullAccess": "arn:aws:iam::aws:policy/AmazonInspector2FullAccess", + "AmazonInspector2ManagedCisPolicy": "arn:aws:iam::aws:policy/AmazonInspector2ManagedCisPolicy", "AmazonInspector2ReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonInspector2ReadOnlyAccess", "AmazonInspector2ServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonInspector2ServiceRolePolicy", "AmazonInspectorFullAccess": "arn:aws:iam::aws:policy/AmazonInspectorFullAccess", @@ -722,6 +781,7 @@ "AmazonKendraReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonKendraReadOnlyAccess", "AmazonKeyspacesFullAccess": "arn:aws:iam::aws:policy/AmazonKeyspacesFullAccess", "AmazonKeyspacesReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonKeyspacesReadOnlyAccess", + "AmazonKeyspacesReadOnlyAccess_v2": "arn:aws:iam::aws:policy/AmazonKeyspacesReadOnlyAccess_v2", "AmazonKinesisAnalyticsFullAccess": "arn:aws:iam::aws:policy/AmazonKinesisAnalyticsFullAccess", "AmazonKinesisAnalyticsReadOnly": "arn:aws:iam::aws:policy/AmazonKinesisAnalyticsReadOnly", "AmazonKinesisFirehoseFullAccess": "arn:aws:iam::aws:policy/AmazonKinesisFirehoseFullAccess", @@ -730,6 +790,7 @@ "AmazonKinesisReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonKinesisReadOnlyAccess", "AmazonKinesisVideoStreamsFullAccess": "arn:aws:iam::aws:policy/AmazonKinesisVideoStreamsFullAccess", "AmazonKinesisVideoStreamsReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonKinesisVideoStreamsReadOnlyAccess", + "AmazonLaunchWizardFullAccessV2": "arn:aws:iam::aws:policy/AmazonLaunchWizardFullAccessV2", "AmazonLaunchWizard_Fullaccess": "arn:aws:iam::aws:policy/AmazonLaunchWizard_Fullaccess", "AmazonLexChannelsAccess": "arn:aws:iam::aws:policy/aws-service-role/AmazonLexChannelsAccess", "AmazonLexFullAccess": "arn:aws:iam::aws:policy/AmazonLexFullAccess", @@ -764,6 +825,7 @@ "AmazonMachineLearningRoleforRedshiftDataSourceV3": "arn:aws:iam::aws:policy/service-role/AmazonMachineLearningRoleforRedshiftDataSourceV3", "AmazonMacieFullAccess": "arn:aws:iam::aws:policy/AmazonMacieFullAccess", "AmazonMacieHandshakeRole": "arn:aws:iam::aws:policy/service-role/AmazonMacieHandshakeRole", + "AmazonMacieReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonMacieReadOnlyAccess", "AmazonMacieServiceRole": "arn:aws:iam::aws:policy/service-role/AmazonMacieServiceRole", "AmazonMacieServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonMacieServiceRolePolicy", "AmazonManagedBlockchainConsoleFullAccess": "arn:aws:iam::aws:policy/AmazonManagedBlockchainConsoleFullAccess", @@ -784,6 +846,10 @@ "AmazonNimbleStudio-StudioUser": "arn:aws:iam::aws:policy/AmazonNimbleStudio-StudioUser", "AmazonOmicsFullAccess": "arn:aws:iam::aws:policy/AmazonOmicsFullAccess", "AmazonOmicsReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonOmicsReadOnlyAccess", + "AmazonOneEnterpriseFullAccess": "arn:aws:iam::aws:policy/AmazonOneEnterpriseFullAccess", + "AmazonOneEnterpriseInstallerAccess": "arn:aws:iam::aws:policy/AmazonOneEnterpriseInstallerAccess", + "AmazonOneEnterpriseReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonOneEnterpriseReadOnlyAccess", + "AmazonOpenSearchDashboardsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonOpenSearchDashboardsServiceRolePolicy", "AmazonOpenSearchIngestionFullAccess": "arn:aws:iam::aws:policy/AmazonOpenSearchIngestionFullAccess", "AmazonOpenSearchIngestionReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonOpenSearchIngestionReadOnlyAccess", "AmazonOpenSearchIngestionServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonOpenSearchIngestionServiceRolePolicy", @@ -799,6 +865,8 @@ "AmazonPrometheusFullAccess": "arn:aws:iam::aws:policy/AmazonPrometheusFullAccess", "AmazonPrometheusQueryAccess": "arn:aws:iam::aws:policy/AmazonPrometheusQueryAccess", "AmazonPrometheusRemoteWriteAccess": "arn:aws:iam::aws:policy/AmazonPrometheusRemoteWriteAccess", + "AmazonPrometheusScraperServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonPrometheusScraperServiceRolePolicy", + "AmazonQFullAccess": "arn:aws:iam::aws:policy/AmazonQFullAccess", "AmazonQLDBConsoleFullAccess": "arn:aws:iam::aws:policy/AmazonQLDBConsoleFullAccess", "AmazonQLDBFullAccess": "arn:aws:iam::aws:policy/AmazonQLDBFullAccess", "AmazonQLDBReadOnly": "arn:aws:iam::aws:policy/AmazonQLDBReadOnly", @@ -809,6 +877,7 @@ "AmazonRDSDirectoryServiceAccess": "arn:aws:iam::aws:policy/service-role/AmazonRDSDirectoryServiceAccess", "AmazonRDSEnhancedMonitoringRole": "arn:aws:iam::aws:policy/service-role/AmazonRDSEnhancedMonitoringRole", "AmazonRDSFullAccess": "arn:aws:iam::aws:policy/AmazonRDSFullAccess", + "AmazonRDSPerformanceInsightsFullAccess": "arn:aws:iam::aws:policy/AmazonRDSPerformanceInsightsFullAccess", "AmazonRDSPerformanceInsightsReadOnly": "arn:aws:iam::aws:policy/AmazonRDSPerformanceInsightsReadOnly", "AmazonRDSPreviewServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonRDSPreviewServiceRolePolicy", "AmazonRDSReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonRDSReadOnlyAccess", @@ -866,8 +935,11 @@ "AmazonSSMServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonSSMServiceRolePolicy", "AmazonSageMakerAdmin-ServiceCatalogProductsServiceRolePolicy": "arn:aws:iam::aws:policy/AmazonSageMakerAdmin-ServiceCatalogProductsServiceRolePolicy", "AmazonSageMakerCanvasAIServicesAccess": "arn:aws:iam::aws:policy/AmazonSageMakerCanvasAIServicesAccess", + "AmazonSageMakerCanvasDataPrepFullAccess": "arn:aws:iam::aws:policy/AmazonSageMakerCanvasDataPrepFullAccess", + "AmazonSageMakerCanvasDirectDeployAccess": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerCanvasDirectDeployAccess", "AmazonSageMakerCanvasForecastAccess": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerCanvasForecastAccess", "AmazonSageMakerCanvasFullAccess": "arn:aws:iam::aws:policy/AmazonSageMakerCanvasFullAccess", + "AmazonSageMakerClusterInstanceRolePolicy": "arn:aws:iam::aws:policy/AmazonSageMakerClusterInstanceRolePolicy", "AmazonSageMakerCoreServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonSageMakerCoreServiceRolePolicy", "AmazonSageMakerEdgeDeviceFleetPolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerEdgeDeviceFleetPolicy", "AmazonSageMakerFeatureStoreAccess": "arn:aws:iam::aws:policy/AmazonSageMakerFeatureStoreAccess", @@ -879,6 +951,9 @@ "AmazonSageMakerModelGovernanceUseAccess": "arn:aws:iam::aws:policy/AmazonSageMakerModelGovernanceUseAccess", "AmazonSageMakerModelRegistryFullAccess": "arn:aws:iam::aws:policy/AmazonSageMakerModelRegistryFullAccess", "AmazonSageMakerNotebooksServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AmazonSageMakerNotebooksServiceRolePolicy", + "AmazonSageMakerPartnerServiceCatalogProductsApiGatewayServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerPartnerServiceCatalogProductsApiGatewayServiceRolePolicy", + "AmazonSageMakerPartnerServiceCatalogProductsCloudFormationServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerPartnerServiceCatalogProductsCloudFormationServiceRolePolicy", + "AmazonSageMakerPartnerServiceCatalogProductsLambdaServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerPartnerServiceCatalogProductsLambdaServiceRolePolicy", "AmazonSageMakerPipelinesIntegrations": "arn:aws:iam::aws:policy/AmazonSageMakerPipelinesIntegrations", "AmazonSageMakerReadOnly": "arn:aws:iam::aws:policy/AmazonSageMakerReadOnly", "AmazonSageMakerServiceCatalogProductsApiGatewayServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerServiceCatalogProductsApiGatewayServiceRolePolicy", @@ -889,6 +964,8 @@ "AmazonSageMakerServiceCatalogProductsFirehoseServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerServiceCatalogProductsFirehoseServiceRolePolicy", "AmazonSageMakerServiceCatalogProductsGlueServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerServiceCatalogProductsGlueServiceRolePolicy", "AmazonSageMakerServiceCatalogProductsLambdaServiceRolePolicy": "arn:aws:iam::aws:policy/service-role/AmazonSageMakerServiceCatalogProductsLambdaServiceRolePolicy", + "AmazonSecurityLakeAdministrator": "arn:aws:iam::aws:policy/AmazonSecurityLakeAdministrator", + "AmazonSecurityLakeMetastoreManager": "arn:aws:iam::aws:policy/service-role/AmazonSecurityLakeMetastoreManager", "AmazonSecurityLakePermissionsBoundary": "arn:aws:iam::aws:policy/AmazonSecurityLakePermissionsBoundary", "AmazonSumerianFullAccess": "arn:aws:iam::aws:policy/AmazonSumerianFullAccess", "AmazonTextractFullAccess": "arn:aws:iam::aws:policy/AmazonTextractFullAccess", @@ -900,6 +977,8 @@ "AmazonTranscribeReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonTranscribeReadOnlyAccess", "AmazonVPCCrossAccountNetworkInterfaceOperations": "arn:aws:iam::aws:policy/AmazonVPCCrossAccountNetworkInterfaceOperations", "AmazonVPCFullAccess": "arn:aws:iam::aws:policy/AmazonVPCFullAccess", + "AmazonVPCNetworkAccessAnalyzerFullAccessPolicy": "arn:aws:iam::aws:policy/AmazonVPCNetworkAccessAnalyzerFullAccessPolicy", + "AmazonVPCReachabilityAnalyzerFullAccessPolicy": "arn:aws:iam::aws:policy/AmazonVPCReachabilityAnalyzerFullAccessPolicy", "AmazonVPCReachabilityAnalyzerPathComponentReadPolicy": "arn:aws:iam::aws:policy/AmazonVPCReachabilityAnalyzerPathComponentReadPolicy", "AmazonVPCReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonVPCReadOnlyAccess", "AmazonWorkDocsFullAccess": "arn:aws:iam::aws:policy/AmazonWorkDocsFullAccess", @@ -918,6 +997,7 @@ "AmazonWorkspacesPCAAccess": "arn:aws:iam::aws:policy/AmazonWorkspacesPCAAccess", "AmazonZocaloFullAccess": "arn:aws:iam::aws:policy/AmazonZocaloFullAccess", "AmazonZocaloReadOnlyAccess": "arn:aws:iam::aws:policy/AmazonZocaloReadOnlyAccess", + "AmplifyBackendDeployFullAccess": "arn:aws:iam::aws:policy/service-role/AmplifyBackendDeployFullAccess", "AppIntegrationsServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AppIntegrationsServiceLinkedRolePolicy", "AppRunnerNetworkingServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AppRunnerNetworkingServiceRolePolicy", "AppRunnerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/AppRunnerServiceRolePolicy", @@ -953,6 +1033,7 @@ "CloudWatchAgentServerPolicy": "arn:aws:iam::aws:policy/CloudWatchAgentServerPolicy", "CloudWatchApplicationInsightsFullAccess": "arn:aws:iam::aws:policy/CloudWatchApplicationInsightsFullAccess", "CloudWatchApplicationInsightsReadOnlyAccess": "arn:aws:iam::aws:policy/CloudWatchApplicationInsightsReadOnlyAccess", + "CloudWatchApplicationSignalsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CloudWatchApplicationSignalsServiceRolePolicy", "CloudWatchAutomaticDashboardsAccess": "arn:aws:iam::aws:policy/CloudWatchAutomaticDashboardsAccess", "CloudWatchCrossAccountSharingConfiguration": "arn:aws:iam::aws:policy/CloudWatchCrossAccountSharingConfiguration", "CloudWatchEventsBuiltInTargetExecutionAccess": "arn:aws:iam::aws:policy/service-role/CloudWatchEventsBuiltInTargetExecutionAccess", @@ -961,11 +1042,13 @@ "CloudWatchEventsReadOnlyAccess": "arn:aws:iam::aws:policy/CloudWatchEventsReadOnlyAccess", "CloudWatchEventsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CloudWatchEventsServiceRolePolicy", "CloudWatchFullAccess": "arn:aws:iam::aws:policy/CloudWatchFullAccess", + "CloudWatchFullAccessV2": "arn:aws:iam::aws:policy/CloudWatchFullAccessV2", "CloudWatchInternetMonitorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CloudWatchInternetMonitorServiceRolePolicy", "CloudWatchLambdaInsightsExecutionRolePolicy": "arn:aws:iam::aws:policy/CloudWatchLambdaInsightsExecutionRolePolicy", "CloudWatchLogsCrossAccountSharingConfiguration": "arn:aws:iam::aws:policy/CloudWatchLogsCrossAccountSharingConfiguration", "CloudWatchLogsFullAccess": "arn:aws:iam::aws:policy/CloudWatchLogsFullAccess", "CloudWatchLogsReadOnlyAccess": "arn:aws:iam::aws:policy/CloudWatchLogsReadOnlyAccess", + "CloudWatchNetworkMonitorServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CloudWatchNetworkMonitorServiceRolePolicy", "CloudWatchReadOnlyAccess": "arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess", "CloudWatchSyntheticsFullAccess": "arn:aws:iam::aws:policy/CloudWatchSyntheticsFullAccess", "CloudWatchSyntheticsReadOnlyAccess": "arn:aws:iam::aws:policy/CloudWatchSyntheticsReadOnlyAccess", @@ -977,6 +1060,9 @@ "ComputeOptimizerReadOnlyAccess": "arn:aws:iam::aws:policy/ComputeOptimizerReadOnlyAccess", "ComputeOptimizerServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/ComputeOptimizerServiceRolePolicy", "ConfigConformsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/ConfigConformsServiceRolePolicy", + "CostOptimizationHubAdminAccess": "arn:aws:iam::aws:policy/CostOptimizationHubAdminAccess", + "CostOptimizationHubReadOnlyAccess": "arn:aws:iam::aws:policy/CostOptimizationHubReadOnlyAccess", + "CostOptimizationHubServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CostOptimizationHubServiceRolePolicy", "CustomerProfilesServiceLinkedRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/CustomerProfilesServiceLinkedRolePolicy", "DAXServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/DAXServiceRolePolicy", "DataScientist": "arn:aws:iam::aws:policy/job-function/DataScientist", @@ -986,10 +1072,12 @@ "DynamoDBReplicationServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/DynamoDBReplicationServiceRolePolicy", "EC2FastLaunchServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/EC2FastLaunchServiceRolePolicy", "EC2FleetTimeShiftableServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/EC2FleetTimeShiftableServiceRolePolicy", + "EC2ImageBuilderLifecycleExecutionPolicy": "arn:aws:iam::aws:policy/service-role/EC2ImageBuilderLifecycleExecutionPolicy", "EC2InstanceConnect": "arn:aws:iam::aws:policy/EC2InstanceConnect", "EC2InstanceProfileForImageBuilder": "arn:aws:iam::aws:policy/EC2InstanceProfileForImageBuilder", "EC2InstanceProfileForImageBuilderECRContainerBuilds": "arn:aws:iam::aws:policy/EC2InstanceProfileForImageBuilderECRContainerBuilds", "ECRReplicationServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/ECRReplicationServiceRolePolicy", + "EMRDescribeClusterPolicyForEMRWAL": "arn:aws:iam::aws:policy/aws-service-role/EMRDescribeClusterPolicyForEMRWAL", "Ec2ImageBuilderCrossAccountDistributionAccess": "arn:aws:iam::aws:policy/Ec2ImageBuilderCrossAccountDistributionAccess", "Ec2InstanceConnectEndpoint": "arn:aws:iam::aws:policy/aws-service-role/Ec2InstanceConnectEndpoint", "ElastiCacheServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/ElastiCacheServiceRolePolicy", @@ -1019,6 +1107,8 @@ "IAMSelfManageServiceSpecificCredentials": "arn:aws:iam::aws:policy/IAMSelfManageServiceSpecificCredentials", "IAMUserChangePassword": "arn:aws:iam::aws:policy/IAMUserChangePassword", "IAMUserSSHKeys": "arn:aws:iam::aws:policy/IAMUserSSHKeys", + "IVSFullAccess": "arn:aws:iam::aws:policy/IVSFullAccess", + "IVSReadOnlyAccess": "arn:aws:iam::aws:policy/IVSReadOnlyAccess", "IVSRecordToS3": "arn:aws:iam::aws:policy/aws-service-role/IVSRecordToS3", "KafkaConnectServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/KafkaConnectServiceRolePolicy", "KafkaServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/KafkaServiceRolePolicy", @@ -1036,10 +1126,12 @@ "MonitronServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/MonitronServiceRolePolicy", "NeptuneConsoleFullAccess": "arn:aws:iam::aws:policy/NeptuneConsoleFullAccess", "NeptuneFullAccess": "arn:aws:iam::aws:policy/NeptuneFullAccess", + "NeptuneGraphReadOnlyAccess": "arn:aws:iam::aws:policy/NeptuneGraphReadOnlyAccess", "NeptuneReadOnlyAccess": "arn:aws:iam::aws:policy/NeptuneReadOnlyAccess", "NetworkAdministrator": "arn:aws:iam::aws:policy/job-function/NetworkAdministrator", "OAMFullAccess": "arn:aws:iam::aws:policy/OAMFullAccess", "OAMReadOnlyAccess": "arn:aws:iam::aws:policy/OAMReadOnlyAccess", + "PartnerCentralAccountManagementUserRoleAssociation": "arn:aws:iam::aws:policy/PartnerCentralAccountManagementUserRoleAssociation", "PowerUserAccess": "arn:aws:iam::aws:policy/PowerUserAccess", "QuickSightAccessForS3StorageManagementAnalyticsReadOnly": "arn:aws:iam::aws:policy/service-role/QuickSightAccessForS3StorageManagementAnalyticsReadOnly", "RDSCloudHsmAuthorizationRole": "arn:aws:iam::aws:policy/service-role/RDSCloudHsmAuthorizationRole", @@ -1048,9 +1140,12 @@ "ROSAControlPlaneOperatorPolicy": "arn:aws:iam::aws:policy/service-role/ROSAControlPlaneOperatorPolicy", "ROSAImageRegistryOperatorPolicy": "arn:aws:iam::aws:policy/service-role/ROSAImageRegistryOperatorPolicy", "ROSAIngressOperatorPolicy": "arn:aws:iam::aws:policy/service-role/ROSAIngressOperatorPolicy", + "ROSAInstallerPolicy": "arn:aws:iam::aws:policy/service-role/ROSAInstallerPolicy", "ROSAKMSProviderPolicy": "arn:aws:iam::aws:policy/service-role/ROSAKMSProviderPolicy", "ROSAKubeControllerPolicy": "arn:aws:iam::aws:policy/service-role/ROSAKubeControllerPolicy", "ROSAManageSubscription": "arn:aws:iam::aws:policy/ROSAManageSubscription", + "ROSANodePoolManagementPolicy": "arn:aws:iam::aws:policy/service-role/ROSANodePoolManagementPolicy", + "ROSASRESupportPolicy": "arn:aws:iam::aws:policy/service-role/ROSASRESupportPolicy", "ROSAWorkerInstancePolicy": "arn:aws:iam::aws:policy/service-role/ROSAWorkerInstancePolicy", "ReadOnlyAccess": "arn:aws:iam::aws:policy/ReadOnlyAccess", "ResourceGroupsServiceRolePolicy": "arn:aws:iam::aws:policy/aws-service-role/ResourceGroupsServiceRolePolicy",