All Products
Search
Document Center

Elastic IP Address:Custom policies for EIP

Last Updated:Mar 12, 2024

If system policies do not meet your requirements, you can configure custom policies to implement the principle of least privilege. You can use custom policies to achieve fine-grained permission control and enhance resource access security. This topic describes the scenarios where you can use custom policies for elastic IP addresses (EIPs).

What is a custom policy?

Resource Access Management (RAM) policies are classified into system policies and custom policies. You need to maintain custom policies.

  • After you create a custom policy, you need to attach it to a RAM user, a user group, or a RAM role so that the permissions specified in the policy can be granted to the principal.

  • You can delete a RAM policy that is not attached to a principal. If the RAM policy is attached to a principal, you must detach the RAM policy from the principal before you can delete the RAM policy.

  • Custom policies support version control. You can manage custom policy versions based on the version management mechanism provided by RAM.

References

Authorization information

Before you configure custom policies, you need to understand the requirements of your businesses and learn about the authorization information about EIP. For more information, see RAM authorization.