Sample IAM Policy

The following is a sample IAM policy in JSON format.

{

"Version": "2012-10-17",

"Statement": [

{

"Sid": "VisualEditor0",

"Effect": "Allow",

"Action": [

"kms:Decrypt",

"kms:Encrypt",

"kms:GenerateDataKey"

],

"Resource": [

"arn:aws:kms:us-east-1:009145568234:key/05581289-e255-4e86-b702-7607f2f80f42",

"arn:aws:kms:::key/08ef629f-4f3e-4f3c-9fee-99fe39cb56e2",

"arn:aws:kms:us-east-1:009145568234:key/bc85c931-e05f-4898-adf7-22323a857088"

]

},

{

"Sid": "VisualEditor1",

"Effect": "Allow",

"Action": [

"cloudwatch:PutMetricData",

"dynamodb:PutItem",

"dynamodb:DeleteItem",

"kinesis:ListShards",

"kinesisvideo:GetDataEndpoint",

"kinesis:GetShardIterator",

"connect:SuspendContactRecording",

"connect:ListInstanceAttributes",

"dynamodb:Scan",

"kinesisvideo:GetMedia",

"dynamodb:UpdateItem",

"kinesis:DescribeStream",

"logs:CreateLogGroup",

"logs:PutLogEvents",

"iam:*",

"dynamodb:CreateTable",

"connect:ResumeContactRecording",

"s3:GetObject",

"kinesisvideo:PutMedia",

"kinesis:PutRecord",

"logs:CreateLogStream",

"dynamodb:DescribeTable",

"dynamodb:GetItem",

"kinesis:GetRecords"

'The following permissions for S3 and Connect are only required when Enable Auto Reconciliation is enabled on Verint's Amazon Connect Adapter.'

"S3:ListBucket",

"connect:DescribeContact",

"connect:DescribeUser",

"connect:GetContactAttributes",

"connect:ListInstanceStorageConfigs",

],

"Resource": "*"

}

]

}

IAM User Permissions