{
  "url": "https://docs.aws.amazon.com/service-authorization/latest/reference/list_amazonaioperations.html",
  "name": "Amazon AI Operations",
  "prefix": "aiops",
  "timestamp": "1776772807",
  "actions": [
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_CreateInvestigation.html",
      "name": "CreateInvestigation",
      "description": "Grants permission to create a new investigation in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_CreateInvestigationEvent.html",
      "name": "CreateInvestigationEvent",
      "description": "Grants permission to create a new investigation event in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "cloudwatch:DescribeAlarmHistory",
        "cloudwatch:DescribeAlarms",
        "cloudwatch:GetInsightRuleReport",
        "cloudwatch:GetMetricData",
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "logs:GetQueryResults",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_CreateInvestigationGroup.html",
      "name": "CreateInvestigationGroup",
      "description": "Grants permission to create a new investigation group",
      "access": "Write",
      "resources": [],
      "conditions": [
        "aws:TagKeys",
        "aws:RequestTag/${TagKey}",
        "aws:ResourceTag/${TagKey}"
      ],
      "dependents": [
        "aiops:TagResource",
        "cloudtrail:DescribeTrails",
        "iam:PassRole",
        "kms:Decrypt",
        "kms:DescribeKey",
        "kms:GenerateDataKey",
        "sso:CreateApplication",
        "sso:DeleteApplication",
        "sso:PutApplicationAccessScope",
        "sso:PutApplicationAssignmentConfiguration",
        "sso:PutApplicationAuthenticationMethod",
        "sso:PutApplicationGrant",
        "sso:TagResource"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_CreateInvestigationResource.html",
      "name": "CreateInvestigationResource",
      "description": "Grants permission to create an investigation resource in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "cloudwatch:DescribeAlarmHistory",
        "cloudwatch:DescribeAlarms",
        "cloudwatch:GetInsightRuleReport",
        "cloudwatch:GetMetricData",
        "kms:GenerateDataKey",
        "logs:GetQueryResults"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_CreateReport.html",
      "name": "CreateReport",
      "description": "Grants permission to create a new report in the specified investigation",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_DeleteInvestigation.html",
      "name": "DeleteInvestigation",
      "description": "Grants permission to delete an investigation in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_DeleteInvestigationGroup.html",
      "name": "DeleteInvestigationGroup",
      "description": "Grants permission to delete the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "sso:DeleteApplication"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_DeleteInvestigationGroupPolicy.html",
      "name": "DeleteInvestigationGroupPolicy",
      "description": "Grants permission to delete the investigation group policy attached to an investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GenerateReport.html",
      "name": "GenerateReport",
      "description": "Grants permission to generate a report in the specified investigation report",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetEphemeralInvestigationResults.html",
      "name": "GetEphemeralInvestigationResults",
      "description": "Grants permission to run and retrieve ephemeral investigation results",
      "access": "List",
      "resources": [],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetFact.html",
      "name": "GetFact",
      "description": "Grants permission to retrieve a fact in the specified investigation report",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetFactVersions.html",
      "name": "GetFactVersions",
      "description": "Grants permission to retrieve all versions of a fact token in the specified investigation report",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetInvestigation.html",
      "name": "GetInvestigation",
      "description": "Grants permission to retrieve an investigation in the specified investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetInvestigationEvent.html",
      "name": "GetInvestigationEvent",
      "description": "Grants permission to retrieve an investigation event in the specified investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetInvestigationGroup.html",
      "name": "GetInvestigationGroup",
      "description": "Grants permission to retrieve the specified investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetInvestigationGroupPolicy.html",
      "name": "GetInvestigationGroupPolicy",
      "description": "Grants permission to retrieve the investigation group policy attached to an investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetInvestigationResource.html",
      "name": "GetInvestigationResource",
      "description": "Grants permission to retrieve an investigation resource in the specified investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_GetReport.html",
      "name": "GetReport",
      "description": "Grants permission to retrieve a report in the specified investigation",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListFacts.html",
      "name": "ListFacts",
      "description": "Grants permission to list all facts in the specified investigation report",
      "access": "List",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListInvestigationEvents.html",
      "name": "ListInvestigationEvents",
      "description": "Grants permission to list all investigation events in the specified investigation group",
      "access": "List",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListInvestigationGroups.html",
      "name": "ListInvestigationGroups",
      "description": "Grants permission to list all investigation groups in the AWS account making the request",
      "access": "List",
      "resources": [],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListInvestigations.html",
      "name": "ListInvestigations",
      "description": "Grants permission to list all investigations that are in the specified investigation group",
      "access": "List",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListReports.html",
      "name": "ListReports",
      "description": "Grants permission to list all reports in the specified investigation",
      "access": "List",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ListTagsForResource.html",
      "name": "ListTagsForResource",
      "description": "Grants permission to list the tags for the specified resource",
      "access": "List",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_PutFact.html",
      "name": "PutFact",
      "description": "Grants permission to create or update a new fact in the specified investigation report",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_PutInvestigationGroupPolicy.html",
      "name": "PutInvestigationGroupPolicy",
      "description": "Grants permission to create/update the investigation group policy attached to an investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_TagResource.html",
      "name": "TagResource",
      "description": "Grants permission to add or update the specified tags for the specified resource",
      "access": "Tagging",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [
        "aws:TagKeys",
        "aws:RequestTag/${TagKey}"
      ],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_UntagResource.html",
      "name": "UntagResource",
      "description": "Grants permission to remove the specified tags from the specified resource",
      "access": "Tagging",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [
        "aws:TagKeys"
      ],
      "dependents": []
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_UpdateInvestigation.html",
      "name": "UpdateInvestigation",
      "description": "Grants permission to update an investigation in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_UpdateInvestigationEvent.html",
      "name": "UpdateInvestigationEvent",
      "description": "Grants permission to update an investigation event in the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_UpdateInvestigationGroup.html",
      "name": "UpdateInvestigationGroup",
      "description": "Grants permission to update the specified investigation group",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "cloudtrail:DescribeTrails",
        "iam:PassRole",
        "kms:Decrypt",
        "kms:DescribeKey",
        "kms:GenerateDataKey",
        "sso:CreateApplication",
        "sso:DeleteApplication",
        "sso:PutApplicationAccessScope",
        "sso:PutApplicationAssignmentConfiguration",
        "sso:PutApplicationAuthenticationMethod",
        "sso:PutApplicationGrant",
        "sso:TagResource"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_UpdateReport.html",
      "name": "UpdateReport",
      "description": "Grants permission to update a report in the specified investigation",
      "access": "Write",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": [
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "sts:SetContext"
      ]
    },
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_ValidateInvestigationGroup.html",
      "name": "ValidateInvestigationGroup",
      "description": "Grants permission to validate the specified investigation group",
      "access": "Read",
      "resources": [
        {
          "name": "investigation-group",
          "is_required": true
        }
      ],
      "conditions": [],
      "dependents": []
    }
  ],
  "resources": [
    {
      "url": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/API_InvestigationGroup.html",
      "name": "investigation-group",
      "arn": "arn:${Partition}:aiops:${Region}:${Account}:investigation-group/${InvestigationGroupId}",
      "conditions": [
        "aws:ResourceTag/${TagKey}"
      ]
    }
  ],
  "conditions": [
    {
      "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-requesttag",
      "name": "aws:RequestTag/${TagKey}",
      "description": "Filters access by the tags that are passed in the request",
      "type": "String"
    },
    {
      "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-resourcetag",
      "name": "aws:ResourceTag/${TagKey}",
      "description": "Filters access by the tags associated with the resource",
      "type": "String"
    },
    {
      "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-tagkeys",
      "name": "aws:TagKeys",
      "description": "Filters access by the tag keys that are passed in the request",
      "type": "ArrayOfString"
    }
  ]
}