A human-readable and unique string identifying the policy. A best practice is to use names that are closely related to your business and security requirements, so you can identify them more easily.
A string containing details about this policy.
Specifies which users are given access by this policy.
The Logic of this policy to apply after the other conditions have been evaluated.