AliyunServiceRolePolicyForHbrRd is the authorization policy dedicated to a service-linked role. The policy is automatically attached to a service role when the service role is created. Then, the service-linked role is authorized to access other cloud services. This policy is updated by the relevant Alibaba Cloud service. Do not attach this policy to a RAM identity other than a service-linked role.
Policy details
Type: service system policy
Creation time: 14:00:32 on November 24, 2025
Update time: 14:00:32 on November 24, 2025
Current version: v1
Policy content
{
"Version": "1",
"Statement": [
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "rd.hbr.aliyuncs.com"
}
}
},
{
"Action": [
"hbr:ClientSendMessage",
"hbr:ClientReceiveMessage"
],
"Resource": "acs:hbr:*:*:messageClient/*",
"Effect": "Allow"
},
{
"Action": [
"ecs:RunCommand",
"ecs:CreateCommand",
"ecs:InvokeCommand",
"ecs:DeleteCommand",
"ecs:DescribeCommands",
"ecs:StopInvocation",
"ecs:DescribeInvocationResults",
"ecs:DescribeCloudAssistantStatus",
"ecs:DescribeInstances",
"ecs:DescribeInstanceRamRole",
"ecs:DescribeInvocations",
"ecs:CreateSnapshotGroup",
"ecs:DescribeSnapshotGroups",
"ecs:DeleteSnapshotGroup",
"ecs:CopySnapshot",
"ecs:DescribeSnapshotLinks",
"ecs:UntagResources",
"ecs:ModifySnapshotCategory",
"ecs:DescribeSecurityGroups",
"ecs:DescribeImages",
"ecs:CreateImage",
"ecs:DeleteImage",
"ecs:DescribeSnapshots",
"ecs:CreateSnapshot",
"ecs:ModifySnapshotAttribute",
"ecs:DeleteSnapshot",
"ecs:DescribeSnapshotLinks",
"ecs:DescribeAvailableResource",
"ecs:ModifyInstanceAttribute",
"ecs:CreateInstance",
"ecs:DeleteInstance",
"ecs:AllocatePublicIpAddress",
"ecs:CreateDisk",
"ecs:DescribeDisks",
"ecs:AttachDisk",
"ecs:DetachDisk",
"ecs:DeleteDisk",
"ecs:ResetDisk",
"ecs:StartInstance",
"ecs:StopInstance",
"ecs:ReplaceSystemDisk",
"ecs:ModifyResourceMeta",
"ecs:TagResources",
"ecs:GetSnapshotInfo",
"ecs:GetSnapshotBlock",
"ecs:ListSnapshotBlocks",
"ecs:ListChangedBlocks"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"ecs:AttachInstanceRamRole",
"ecs:DetachInstanceRamRole"
],
"Resource": [
"acs:ecs:*:*:instance/*",
"acs:ram:*:*:role/aliyunecsaccessinghbrrole"
],
"Effect": "Allow"
},
{
"Action": [
"vpc:DescribeVpcs",
"vpc:DescribeVSwitches"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"nas:DescribeFileSystems",
"nas:CreateMountTargetSpecial",
"nas:DeleteMountTargetSpecial",
"nas:CreateMountTarget",
"nas:DeleteMountTarget",
"nas:DescribeMountTargets",
"nas:DescribeAccessGroups",
"nas:CreateAccessGroup",
"nas:CreateAccessRule",
"nas:DescribeSmbAcl",
"nas:DescribeAccessRules"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"oss:ListBuckets",
"oss:GetBucketTagging",
"oss:GetBucketInventory",
"oss:HeadBucket",
"oss:GetBucket",
"oss:GetBucketAcl",
"oss:GetBucketLocation",
"oss:GetBucketInfo",
"oss:GetBucketStat",
"oss:GetBucketVersioning",
"oss:ListObjects"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"oss:PutObject",
"oss:CopyObject",
"oss:GetObject",
"oss:AppendObject",
"oss:GetObjectMeta",
"oss:PutObjectACL",
"oss:GetObjectACL",
"oss:PutObjectTagging",
"oss:GetObjectTagging",
"oss:InitiateMultipartUpload",
"oss:UploadPart",
"oss:UploadPartCopy",
"oss:CompleteMultipartUpload",
"oss:AbortMultipartUpload",
"oss:ListMultipartUploads",
"oss:ListParts",
"oss:DeleteObject"
],
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEqualsIgnoreCase": {
"oss:BucketSysTag/acs:hbr:backup": "true"
}
}
},
{
"Action": [
"ots:ListInstance",
"ots:GetInstance",
"ots:ListTable",
"ots:CreateTable",
"ots:UpdateTable",
"ots:DescribeTable",
"ots:BatchWriteRow",
"ots:CreateTunnel",
"ots:DeleteTunnel",
"ots:ListTunnel",
"ots:DescribeTunnel",
"ots:ConsumeTunnel",
"ots:GetRange",
"ots:ListStream",
"ots:DescribeStream",
"ots:CreateIndex",
"ots:CreateSearchIndex",
"ots:DescribeSearchIndex",
"ots:ListSearchIndex"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "bssapi:QueryAvailableInstances",
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"cms:QueryMetricList"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"kms:ListKeys",
"kms:ListAlias"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"tag:ListResourcesByTag",
"tag:ListTagResources",
"tag:ListTagKeys",
"tag:ListTagValues"
],
"Resource": "*",
"Effect": "Allow"
}
]
}