All Products
Search
Document Center

Security Center:Best practices for managing RAM user permissions

Last Updated:Nov 24, 2025

To implement fine-grained permission management for Security Center features, you can attach system policies or custom policies to Resource Access Management (RAM) users. This topic describes how to grant system and custom policies to RAM users for fine-grained permission management.

Background information

Resource Access Management (RAM) provides default system policies for Alibaba Cloud services and lets you create custom policies. System policies are created by Alibaba Cloud and cannot be modified. You can use custom policies to precisely control the access of RAM users to Security Center and the operations they can perform.

Note

Security Center supports the AliyunYundunSASFullAccess policy, which grants RAM users full permissions for all Security Center features, and the AliyunYundunSASReadOnlyAccess policy, which grants RAM users read-only access to all data in Security Center.

Create a RAM user

For more information, see Create a RAM user.

Grant a system policy to a RAM user

Alibaba Cloud provides system policies for User Center and for accessing and managing Security Center. If a RAM user receives a No Permission message when they attempt to purchase, renew, or unsubscribe from a Security Center instance, or a No Permission. Check Your Permissions. message when they access Security Center, grant the required system policies to the RAM user as follows.

Important

System policies in the User Center apply to all cloud products. When you grant these policies to a RAM user, the user is granted permission to purchase, renew, and cancel subscriptions for all cloud products.

  1. Log on to the RAM console as a RAM administrator.

  2. In the navigation pane on the left, choose Identities > Users.

  3. On the Users page, find the required RAM user, and click Add Permissions in the Actions column.

    image

    You can also select multiple RAM users and click Add Permissions in the lower part of the page to grant permissions to the RAM users at a time.

  4. In the Grant Permission panel, grant permissions to the RAM user.

    1. Configure the Resource Scope parameter.

    2. Configure the Principal parameter.

      The principal is the RAM user to which you want to grant permissions. The current RAM user is automatically selected.

    3. Select a system policy based on the scenario and click OK.

      Scenario

      System policy

      Purchase, renew, or unsubscribe from Security Center instances

      AliyunBSSOrderAccess, AliyunBSSRefundAccess

      Read-only access to Security Center

      AliyunYundunSASReadOnlyAccess

      Manage Security Center

      AliyunYundunSASFullAccess

  5. Click Close.

Grant a custom policy to a RAM user

Follow these steps to use custom permissions to precisely control the access of a RAM user to Security Center and the operations they can perform.

Step 1: Create a custom policy for Security Center

  1. Log on to the RAM console as a RAM administrator.

  2. In the left-side navigation pane, choose Permissions > Policies.

  3. On the Policies page, click Create Policy.

    image

  4. On the Create Policy page, click the JSON tab. The following code provides common script examples:

    • Renewal and refund

      Scenario

      Script

      Query the price for auto-renewal (bssapi:QueryAvailableInstances) and configure auto-renewal settings (bssapi:SetRenewal)

      {
          "Version": "1",
          "Statement": [
              {
                 "Action": [
                           "bssapi:QueryAvailableInstances",
                           "bssapi:SetRenewal",
                           "bss:ModifyPrepaidInstanceAutoRenew",
                           "bss:PayOrder",
                           "bss:QueryPrice",
                           "bss:RefundBatchRemainRefund"
                           ],
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }

      Modify auto-renewal settings (bss:ModifyPrepaidInstanceAutoRenew)

      Pay for renewal and upgrade/downgrade orders (bss:PayOrder)

      Display discounted prices (bss:QueryPrice)

      Request a refund (bss:RefundBatchRemainRefund)

    • Read-only access to Asset Center

      {
          "Version": "1",
          "Statement": [
              {
                 "Action": [
                           "yundun-sas:DescribeCloudCenterInstances",
                           "yundun-sas:DescribeFieldStatistics",
                           "yundun-sas:DescribeCriteria"
                           ],
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
    • Security check in Asset Center

      {
          "Version": "1",
          "Statement": [
              {
                  "Action": "yundun-sas:ModifyPushAllTask",
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
    • Read-only access to vulnerability management

      {
          "Version": "1",
          "Statement": [
              {
                  "Action": [
                      "yundun-sas:DescribeVulFixStatistics",
                      "yundun-sas:DescribeVulDefendCountStatistics",
                      "yundun-sas:DescribeVulMetaCountStatistics",
                      "yundun-sas:DescribeVulListPage",
                      "yundun-sas:DescribeVulNumStatistics",
                      "yundun-sas:DescribeVulConfig",
                      "yundun-sas:DescribeGroupedVul",
                      "yundun-sas:DescribeVulDetails",
                      "yundun-sas:DescribeVulList",
                      "yundun-sas:DescribeVulWhitelist",
                      "yundun-sas:DescribeAppVulScanCycle",
                      "yundun-sas:ListVulAutoRepairConfig",
                      "yundun-sas:DescribeEmgUserAgreement",
                      "yundun-sas:DescribeEmgVulItem",
                      "yundun-sas:DescribeUuidsByVulNames",
                      "yundun-sas:DescribeTarget",
                      "yundun-sas:DescribeVulTargetStatistics",
                      "yundun-sas:DescribeConcernNecessity",
                      "yundun-sas:DescribeOnceTask",
                      "yundun-sas:GetOnceTaskResultInfo",
                      "yundun-sas:DescribeCycleTaskList",
                      "yundun-sas:DescribeVulExportInfo",
                      "yundun-sas:DescribeInstanceRebootStatus",
                      "yundun-sas:DescribeMachineCanReboot"
                  ],
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
    • Vulnerability management

      {
          "Version": "1",
          "Statement": [
              {
                  "Action": [
                      "yundun-sas:OperateVuls",
                      "yundun-sas:ModifyCreateVulWhitelist",
                      "yundun-sas:DeleteVulWhitelist",
                      "yundun-sas:ModifyVulWhitelistTarget",
                      "yundun-sas:ModifyOperateVul",
                      "yundun-sas:ModifyStartVulScan",
                      "yundun-sas:ModifyVulConfig",
                      "yundun-sas:ModifyEmgVulSubmit",
                      "yundun-sas:ModifyVulTarget",
                      "yundun-sas:ModifyCycleTask",
                      "yundun-sas:ModifyAppVulScanCycle",
                      "yundun-sas:ModifyAutoDelConfig",
                      "yundun-sas:ModifyConcernNecessity",
                      "yundun-sas:DeleteVulAutoRepairConfig",
                      "yundun-sas:CreateVulAutoRepairConfig",
                      "yundun-sas:ExportVul",
                      "yundun-sas:RebootMachine",
                      "yundun-sas:DescribeVulFixStatistics",
                      "yundun-sas:DescribeVulDefendCountStatistics",
                      "yundun-sas:DescribeVulMetaCountStatistics",
                      "yundun-sas:DescribeVulListPage",
                      "yundun-sas:DescribeVulNumStatistics",
                      "yundun-sas:DescribeVulConfig",
                      "yundun-sas:DescribeGroupedVul",
                      "yundun-sas:DescribeVulDetails",
                      "yundun-sas:DescribeVulList",
                      "yundun-sas:DescribeVulWhitelist",
                      "yundun-sas:DescribeAppVulScanCycle",
                      "yundun-sas:ListVulAutoRepairConfig",
                      "yundun-sas:DescribeEmgUserAgreement",
                      "yundun-sas:DescribeEmgVulItem",
                      "yundun-sas:DescribeUuidsByVulNames",
                      "yundun-sas:DescribeTarget",
                      "yundun-sas:DescribeVulTargetStatistics",
                      "yundun-sas:DescribeConcernNecessity",
                      "yundun-sas:DescribeOnceTask",
                      "yundun-sas:GetOnceTaskResultInfo",
                      "yundun-sas:DescribeCycleTaskList",
                      "yundun-sas:DescribeVulExportInfo",
                      "yundun-sas:DescribeInstanceRebootStatus",
                      "yundun-sas:DescribeMachineCanReboot"
                  ],
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
    • O&M engineer permissions

      Note

      In the O&M engineer permissions scenario, this policy script allows a RAM user to use the vulnerability scan, vulnerability fixing, baseline check, and Asset Center features and perform related operations. After you attach this policy, refer to the actions and their descriptions in the Appendix: Common custom permission policies for features table in this topic to learn about the specific operations that the RAM user can perform.

      {
          "Version": "1",
          "Statement": [{
                  "Action": [
                      "yundun-sas:OperateVul",
                      "yundun-sas:ModifyStartVulScan"
                  ],
                  "Resource": "*",
                  "Effect": "Allow"
              },
              {
                  "Action": [
                      "yundun-sas:FixCheckWarnings",
                      "yundun-sas:IgnoreHcCheckWarnings",
                      "yundun-sas:ValidateHcWarnings"
                  ],
                  "Resource": "*",
                  "Effect": "Allow"
              },
              {
                  "Action": "ecs:RebootInstance",
                  "Effect": "Allow",
                  "Resource": "*",
                  "Condition": {
                      "Bool": {
                          "acs:MFAPresent": "true"
                      }
                  }
              },
              {
                  "Action": "ecs:*",
                  "Effect": "Allow",
                  "Resource": [
                      "acs:ecs:*:*:*"
                  ]
              },
              {
                  "Action": "ecs:CreateSnapshot",
                  "Effect": "Allow",
                  "Resource": [
                      "acs:ecs:*:*:*",
                      "acs:ecs:*:*:snapshot/*"
                  ]
              },
              {
                  "Action": [
                      "ecs:Describe*"
                  ],
                  "Effect": "Allow",
                  "Resource": "*"
              }, {
                  "Action": [
                      "yundun-sas:ModifyPushAllTask",
                      "yundun-sas:DeleteTagWithUuid",
                      "yundun-sas:ModifyTagWithUuid",
                      "yundun-sas:CreateOrUpdateAssetGroup",
                      "yundun-sas:DeleteGroup",
                      "yundun-sas:ModifyAssetImportant",
                      "yundun-sas:RefreshAssets"
      
                  ],
                  "Resource": "*",
                  "Effect": "Allow"
              }
          ]
      }
  5. Click Continue To Edit Basic Information, and then enter a Name and Note for the policy.

  6. Click OK.

Step 2: Grant permissions to the RAM user

  1. Log on to the RAM console as a RAM administrator.

  2. In the left-side navigation pane, choose Permissions > Grants.

  3. On the Permission page, click Grant Permission.

    image

  4. In the Grant Permission panel, grant permissions to the RAM user.

    A newly created RAM user has no permissions by default.

    1. Configure the Resource Scope parameter.

    2. Configure the Principal parameter.

      The principal is the RAM user to which you want to grant permissions. You can select multiple RAM users at a time.

    3. Select policies.

      • Search for and select the AliyunYundunSASReadOnlyAccess policy. This system policy grants the O&M engineer read-only access to Security Center.

      • Search for and select the custom policy that you created in Step 1: Create a custom policy for Security Center.

  5. Click OK.

Appendix: Common custom permission policies for features

When a RAM user uses a specific feature of Security Center, you must grant the RAM user the corresponding custom permissions for the feature. The following sections describe the custom permission policy scripts for common feature modules of Security Center.

Note

In most cases, each action in a RAM custom policy corresponds to an API operation of the Alibaba Cloud service.

Asset Center

Action in RAM policy

Description

Supported API

yundun-sas:DescribeCloudCenterInstances

Queries a list of assets. The information includes the asset type, whether security alerts exist, and the online status of the client.

DescribeCloudCenterInstances

yundun-sas:DescribeFieldStatistics

Queries the statistics of servers among your assets.

DescribeFieldStatistics

yundun-sas:DescribeCriteria

Obtains the query condition information that corresponds to the value you entered for a fuzzy search when you query assets.

DescribeCriteria - Queries the criteria for assets

yundun-sas:ModifyPushAllTask

Performs a security check task on servers.

ModifyPushAllTask

yundun-sas:DeleteGroup

Deletes an asset group.

DeleteGroup

yundun-sas:DescribeSearchCondition

Queries the filter conditions for assets.

DescribeSearchCondition

yundun-sas:DescribeImageStatistics

Queries the risk statistics of container image assets.

DescribeImageStatistics

yundun-sas:DescribeGroupedTags

Queries the statistics of asset tags.

DescribeGroupedTags

yundun-sas:DescribeDomainCount

Obtains the number of domain name assets.

DescribeDomainCount

yundun-sas:DescribeCloudProductFieldStatistics

Obtains the statistics of Alibaba Cloud services.

DescribeCloudProductFieldStatistics

yundun-sas:DescribeCloudCenterInstances

Queries asset information.

DescribeCloudCenterInstances

yundun-sas:DescribeAllGroups

Queries information about all server groups.

DescribeAllGroups

yundun-sas:CreateOrUpdateAssetGroup

Creates a server group or modifies the servers in a server group.

CreateOrUpdateAssetGroup

yundun-sas:DescribeInstanceStatistics

Queries the risk statistics of assets.

DescribeInstanceStatistics

yundun-sas:PauseClient

Enables or pauses the agent client.

PauseClient - Pauses or resumes the Agent client

yundun-sas:ModifyTagWithUuid

Modifies the name of an asset tag or modifies the assets that are included in a specified tag.

ModifyTagWithUuid - Modify the name or associated assets of an asset tag

yundun-sas:RefreshAssets

Synchronizes the latest assets.

RefreshAssets

yundun-sas:ExportRecord

Exports the check results from pages such as Asset Center, Cloud Security Posture Management, Image Security Scan, Attack Analysis, and AccessKey Pair Leakage Detection to an Excel file.

ExportRecord

yundun-sas:DescribeExportInfo

Views the progress of an asset export task.

DescribeExportInfo - Describes the progress of an asset list export

yundun-sas:DescribeDomainList

Queries a list of domain name assets.

DescribeDomainList

yundun-sas:DescribeDomainDetail

Obtains the details of a domain name asset.

DescribeDomainDetail

yundun-sas:DescribeAssetDetailByUuid

Queries the details of an asset using the universally unique identifier (UUID) of the asset.

DescribeAssetDetailByUuid

Vulnerability management

Action in RAM policy

Description

Supported API

yundun-sas:DescribeVulWhitelist

Performs a paged query to query the vulnerability whitelist.

DescribeVulWhitelist

yundun-sas:ModifyOperateVul

Handles detected vulnerabilities. You can fix, verify, or ignore the vulnerabilities.

ModifyOperateVul

yundun-sas:ModifyVulTargetConfig

Configures vulnerability detection for a single server.

ModifyVulTargetConfig

yundun-sas:DescribeConcernNecessity

Queries information about the necessity of fixing vulnerabilities that you follow.

DescribeConcernNecessity

yundun-sas:DescribeVulList

Queries vulnerability information based on the vulnerability type.

DescribeVulList

yundun-sas:ModifyOperateVul

Handles detected vulnerabilities. You can fix, verify, or ignore the vulnerabilities.

ModifyOperateVul

yundun-sas:DescribeImageVulList

Views the details of vulnerabilities that are detected by image security scans and a list of container images that are affected by the vulnerabilities.

DescribeImageVulList

yundun-sas:ExportVul

Exports a list of vulnerabilities.

ExportVul

yundun-sas:DescribeVulExportInfo

Views the progress of a vulnerability export task.

DescribeVulExportInfo

Cloud Security Posture Management

Action in RAM policy

Description

Supported API

yundun-sas:FixCheckWarnings

Fixes baseline check risks.

FixCheckWarnings

yundun-sas:IgnoreHcCheckWarnings

Ignores or stops ignoring baseline check risks.

IgnoreHcCheckWarnings - Ignore or unignore threats in a baseline in batches

yundun-sas:ValidateHcWarnings

Verifies baseline check risks.

ValidateHcWarnings

References

Policy elements: A RAM policy is used to describe the content of an authorization. A policy consists of basic elements such as Effect, Action, Resource, Condition, and Principal.

Policy structure and syntax: Learn about the structure and syntax of policies to create or update them.

Use RAM to manage the permissions of multiple O&M engineers: If your enterprise has various O&M requirements, you can use RAM to control the permissions of each type of O&M engineer to simplify permission management and control.

Use RAM to restrict the IP addresses that can be used to access Alibaba Cloud resources: You can use RAM to allow users to access your enterprise's cloud resources only from specified IP addresses. This improves access security.

Use RAM to restrict the period of time during which RAM users can access Alibaba Cloud resources: You can use RAM to allow users to access your enterprise's cloud resources only during a specified period. This improves access security.