All Products
Search
Document Center

Security Center:Custom policies for Security Center

Last Updated:Apr 30, 2024

If system policies cannot meet your requirements, you can create custom policies to implement the principle of least privilege. You can use custom policies to implement fine-grained permission management to improve resource access security. This topic describes common scenarios in which you can use custom policies for Security Center and provides examples.

What is a custom policy?

Resource Access Management (RAM) policies are classified into system policies and custom policies. You can manage custom policies based on your business requirements.

  • After you create a custom policy, you must attach the policy to a RAM user, RAM user group, or RAM role. This way, the permissions that are specified in the policy can be granted to the principal.

  • You can delete a RAM policy that is not attached to a principal. If the RAM policy is attached to a principal, you must detach the RAM policy from the principal before you can delete the RAM policy.

  • Custom policies support version control. You can manage custom policy versions based on the version management mechanism provided by RAM.

References

Common scenarios of custom policies and sample custom policies

Best practices to manage permissions of RAM users

Authorization information

To use a custom policy, you must understand the permission management requirements of your business and the authorization information about Security Center. For more information, see RAM authorization.