Sample IAM Policy
The following is a sample IAM policy in JSON format.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"kms:Decrypt",
"kms:Encrypt",
"kms:GenerateDataKey"
],
"Resource": [
"arn:aws:kms:us-east-1:009145568234:key/05581289-e255-4e86-b702-7607f2f80f42",
"arn:aws:kms:::key/08ef629f-4f3e-4f3c-9fee-99fe39cb56e2",
"arn:aws:kms:us-east-1:009145568234:key/bc85c931-e05f-4898-adf7-22323a857088"
]
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": [
"cloudwatch:PutMetricData",
"dynamodb:PutItem",
"dynamodb:DeleteItem",
"kinesis:ListShards",
"kinesisvideo:GetDataEndpoint",
"kinesis:GetShardIterator",
"connect:SuspendContactRecording",
"connect:ListInstanceAttributes",
"dynamodb:Scan",
"kinesisvideo:GetMedia",
"dynamodb:UpdateItem",
"kinesis:DescribeStream",
"logs:CreateLogGroup",
"logs:PutLogEvents",
"iam:*",
"dynamodb:CreateTable",
"connect:ResumeContactRecording",
"s3:GetObject",
"kinesisvideo:PutMedia",
"kinesis:PutRecord",
"logs:CreateLogStream",
"dynamodb:DescribeTable",
"dynamodb:GetItem",
"kinesis:GetRecords"
'The following permissions for S3 and Connect are only required when Enable Auto Reconciliation is enabled on Verint's Amazon Connect Adapter.'
"S3:ListBucket",
"connect:DescribeContact",
"connect:DescribeUser",
"connect:GetContactAttributes",
"connect:ListInstanceStorageConfigs",
],
"Resource": "*"
}
]
}