Understand the Amazon Managed policy for Amazon IoT Device Tester
An Amazon managed policy is a standalone policy that is created and administered by Amazon. Amazon managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.
Keep in mind that Amazon managed policies might not grant least-privilege permissions for your specific use cases because they're available for all Amazon customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.
You cannot change the permissions defined in Amazon managed policies. If Amazon updates the permissions defined in an Amazon managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. Amazon is most likely to update an Amazon managed policy when a new Amazon Web Services service is launched or new API operations become available for existing services.
For more information, see Amazon managed policies in the IAM User Guide.
Topics
Amazon managed policy: AmazonIoTDeviceTesterForFreeRTOSFullAccess
The AWSIoTDeviceTesterForFreeRTOSFullAccess
managed policy contains the
following Amazon IoT Device Tester permissions for version checking, auto update features, and collection of metrics.
Permission details
This policy includes the following permissions:
-
iot-device-tester:SupportedVersion
Grants Amazon IoT Device Tester permission to fetch the list of supported products, test suites and IDT versions.
-
iot-device-tester:LatestIdt
Grants Amazon IoT Device Tester permission to fetch the latest IDT version available for download.
-
iot-device-tester:CheckVersion
Grants Amazon IoT Device Tester permission to check version compatibility for IDT, test suites and products.
-
iot-device-tester:DownloadTestSuite
Grants Amazon IoT Device Tester permission to download test suite updates.
-
iot-device-tester:SendMetrics
Grants Amazon permission to collect metrics about Amazon IoT Device Tester internal usage.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": "iam:PassRole", "Resource": "arn:aws:iam::*:role/idt-*", "Condition": { "StringEquals": { "iam:PassedToService": "iot.amazonaws.com" } } }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": [ "iot:DeleteThing", "iot:AttachThingPrincipal", "iot:DeleteCertificate", "iot:GetRegistrationCode", "iot:CreatePolicy", "iot:UpdateCACertificate", "s3:ListBucket", "iot:DescribeEndpoint", "iot:CreateOTAUpdate", "iot:CreateStream", "signer:ListSigningJobs", "acm:ListCertificates", "iot:CreateKeysAndCertificate", "iot:UpdateCertificate", "iot:CreateCertificateFromCsr", "iot:DetachThingPrincipal", "iot:RegisterCACertificate", "iot:CreateThing", "iam:ListRoles", "iot:RegisterCertificate", "iot:DeleteCACertificate", "signer:PutSigningProfile", "s3:ListAllMyBuckets", "signer:ListSigningPlatforms", "iot-device-tester:SendMetrics", "iot-device-tester:SupportedVersion", "iot-device-tester:LatestIdt", "iot-device-tester:CheckVersion", "iot-device-tester:DownloadTestSuite" ], "Resource": "*" }, { "Sid": "VisualEditor2", "Effect": "Allow", "Action": [ "iam:GetRole", "signer:StartSigningJob", "acm:GetCertificate", "signer:DescribeSigningJob", "s3:CreateBucket", "execute-api:Invoke", "s3:DeleteBucket", "s3:PutBucketVersioning", "signer:CancelSigningProfile" ], "Resource": [ "arn:aws:execute-api:us-east-1:098862408343:9xpmnvs5h4/prod/POST/metrics", "arn:aws:signer:*:*:/signing-profiles/*", "arn:aws:signer:*:*:/signing-jobs/*", "arn:aws:iam::*:role/idt-*", "arn:aws:acm:*:*:certificate/*", "arn:aws:s3:::idt-*", "arn:aws:s3:::afr-ota*" ] }, { "Sid": "VisualEditor3", "Effect": "Allow", "Action": [ "iot:DeleteStream", "iot:DeleteCertificate", "iot:AttachPolicy", "iot:DetachPolicy", "iot:DeletePolicy", "s3:ListBucketVersions", "iot:UpdateCertificate", "iot:GetOTAUpdate", "iot:DeleteOTAUpdate", "iot:DescribeJobExecution" ], "Resource": [ "arn:aws:s3:::afr-ota*", "arn:aws:iot:*:*:thinggroup/idt*", "arn:aws:iam::*:role/idt-*" ] }, { "Sid": "VisualEditor4", "Effect": "Allow", "Action": [ "iot:DeleteCertificate", "iot:AttachPolicy", "iot:DetachPolicy", "s3:DeleteObjectVersion", "iot:DeleteOTAUpdate", "s3:PutObject", "s3:GetObject", "iot:DeleteStream", "iot:DeletePolicy", "s3:DeleteObject", "iot:UpdateCertificate", "iot:GetOTAUpdate", "s3:GetObjectVersion", "iot:DescribeJobExecution" ], "Resource": [ "arn:aws:s3:::afr-ota*/*", "arn:aws:s3:::idt-*/*", "arn:aws:iot:*:*:policy/idt*", "arn:aws:iam::*:role/idt-*", "arn:aws:iot:*:*:otaupdate/idt*", "arn:aws:iot:*:*:thing/idt*", "arn:aws:iot:*:*:cert/*", "arn:aws:iot:*:*:job/*", "arn:aws:iot:*:*:stream/*" ] }, { "Sid": "VisualEditor5", "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject" ], "Resource": [ "arn:aws:s3:::afr-ota*/*", "arn:aws:s3:::idt-*/*" ] }, { "Sid": "VisualEditor6", "Effect": "Allow", "Action": [ "iot:CancelJobExecution" ], "Resource": [ "arn:aws:iot:*:*:job/*", "arn:aws:iot:*:*:thing/idt*" ] }, { "Sid": "VisualEditor7", "Effect": "Allow", "Action": [ "ec2:TerminateInstances" ], "Resource": [ "arn:aws:ec2:*:*:instance/*" ], "Condition": { "StringEquals": { "ec2:ResourceTag/Owner": "IoTDeviceTester" } } }, { "Sid": "VisualEditor8", "Effect": "Allow", "Action": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:DeleteSecurityGroup" ], "Resource": [ "arn:aws:ec2:*:*:security-group/*" ], "Condition": { "StringEquals": { "ec2:ResourceTag/Owner": "IoTDeviceTester" } } }, { "Sid": "VisualEditor9", "Effect": "Allow", "Action": [ "ec2:RunInstances" ], "Resource": [ "arn:aws:ec2:*:*:instance/*" ], "Condition": { "StringEquals": { "aws:RequestTag/Owner": "IoTDeviceTester" } } }, { "Sid": "VisualEditor10", "Effect": "Allow", "Action": [ "ec2:RunInstances" ], "Resource": [ "arn:aws:ec2:*:*:image/*", "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:volume/*", "arn:aws:ec2:*:*:key-pair/*", "arn:aws:ec2:*:*:placement-group/*", "arn:aws:ec2:*:*:snapshot/*", "arn:aws:ec2:*:*:network-interface/*", "arn:aws:ec2:*:*:subnet/*" ] }, { "Sid": "VisualEditor11", "Effect": "Allow", "Action": [ "ec2:CreateSecurityGroup" ], "Resource": [ "arn:aws:ec2:*:*:security-group/*" ], "Condition": { "StringEquals": { "aws:RequestTag/Owner": "IoTDeviceTester" } } }, { "Sid": "VisualEditor12", "Effect": "Allow", "Action": [ "ec2:DescribeInstances", "ec2:DescribeSecurityGroups", "ssm:DescribeParameters", "ssm:GetParameters" ], "Resource": "*" }, { "Sid": "VisualEditor13", "Effect": "Allow", "Action": [ "ec2:CreateTags" ], "Resource": [ "arn:aws:ec2:*:*:security-group/*", "arn:aws:ec2:*:*:instance/*" ], "Condition": { "ForAnyValue:StringEquals": { "aws:TagKeys": [ "Owner" ] }, "StringEquals": { "ec2:CreateAction": [ "RunInstances", "CreateSecurityGroup" ] } } } ] }
Updates to Amazon managed policies
You can view details about updates to Amazon managed policies for Amazon IoT Device Tester from the time this service began tracking these changes.
Version | Change | Description | Date |
---|---|---|---|
7 (Latest) |
Restructured the |
Removing usage of |
6/14/2023 |
6 |
Removed |
Removing permissions as this action is deprecated as of March 1st, 2023. |
6/2/2023 |
5 |
Added permissions to run echo server tests using EC2. |
This is for starting and stopping an EC2 instance in customers' Amazon accounts. |
12/15/2020 |
4 |
Added |
This permission cancels OTA jobs. |
7/17/2020 |
3 |
Added the following permissions:
|
|
3/23/2020 |
2 |
Added
|
Grants Amazon permission to collect metrics about Amazon IoT Device Tester internal usage. |
2/18/2020 |
1 |
Initial version. |
2/12/2020 |