Creating IAM Roles on AWS¶
Here is an example of how to set up IAM roles on AWS Management Console.
- Navigate to the IAMservice on AWS Management Console.
- 
Create a new IAM policy: - Click Create Policyin the IAM policy menu.
- Open the JSONtab and paste the following policy. ClickReview Policy.{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ses:DescribeActiveReceiptRuleSet", "athena:GetWorkGroup", "logs:DescribeLogGroups", "logs:DescribeMetricFilters", "elastictranscoder:ListPipelines", "elasticfilesystem:DescribeFileSystems", "servicequotas:ListServiceQuotas" ], "Resource": "*" } ] }
- Enter RISKENin the name field and clickCreate Policy.
 
- Click 
- 
Create a new IAM role: - Click Create Rolein the IAM role menu.
- Select AWS accountforSelect type of trusted entityand enter the following:- AWS account: Another AWS account
- Account ID: You need to register the AWS account ID for RISKEN as a trusted entity.
 AWS account IDPlease contact your system administrator for the AWS account ID in the RISKEN environment. - External ID:
{External ID generated earlier}
 
- Click Next: Permissions.
 
- On the Permissions screen, search for and check the following two policies, then click Next: Tags:- RISKEN(the policy created earlier)
- SecurityAudit(the management policy)
 
- Click Next: Tags.
- On the Review screen, enter RISKENin the Role name field and clickCreate Role.
 
- Click 




