This topic describes the system policies that are related to Cloud Storage Gateway (CSG).
What is a system policy?
A policy is a set of permissions that are defined based on the policy structure and syntax. You can use policies to describe the authorized resource sets, authorized operation sets, and authorization conditions. Alibaba Cloud RAM provides system policies and custom policies. All system policies are created and updated by Alibaba Cloud. You can use system policies, but you cannot modify them. Custom policies are managed by you. You can create, update, and delete custom policies. In the case of CSG service iterations, new permissions are added to system policies to support new features and capabilities. The update of a system policy affects all RAM identities to which the policy is attached. RAM identities include RAM users, RAM user groups, and RAM roles. For more information about RAM policies, see Policy overview.
System policies are designed for new users to quickly get started with Alibaba Cloud services in the Alibaba Cloud Management Console. System policies also apply to programmatic access methods, such as API operations and CLI commands. However, in programmatic access scenarios, we recommend that you use finer-grained custom policies to allow only the designated users to access only the specified resources based on actual requirements.
System policies can be classified into service system policies, service role policies, and service-linked role policies. Some cloud services provide only one or two of the three types of policies.
System policies
AliyunHCSSGWFullAccess
The AliyunHCSSGWFullAccess policy grants RAM identities full access to CSG.
AliyunHCSSGWReadOnlyAccess
The AliyunHCSSGWReadOnlyAccess policy grants RAM identities read-only access to CSG.
Authorization references
By default, RAM identities do not have any permissions. RAM identities can access cloud resources within an Alibaba Cloud account only after an account administrator grants the required permissions to the RAM identities. To ensure resource security, we recommend that you grant only required permissions to the RAM identities based on the principle of least privilege. For more information, see the following topics: