You can copy paste the below JSON for adding all the mentioned roles and permissions as an IAM policy to your newly created AWS IAM user:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"application-autoscaling:*",
"tag:GetResources",
"rds:*",
"logs:*",
"events:PutRule",
"dynamodb:*",
"es:CreateElasticsearchDomain",
"es:ListTags",
"autoscaling:*",
"es:AddTags",
"events:ListRuleNamesByTarget",
"es:DeleteElasticsearchDomain",
"es:DescribeElasticsearchDomain",
"kms:*",
"events:RemoveTargets",
"events:ListTargetsByRule",
"cloudtrail:LookupEvents",
"events:DescribeRule",
"s3:*",
"elasticloadbalancing:*",
"iam:*",
"events:DeleteRule",
"events:PutTargets",
"es:RemoveTags",
"cloudwatch:*",
"ecs:*",
"route53:*",
"ecr:*",
"ec2:*",
"eks:*",
"elasticache:*"
],
"Resource": "*"
}
]
}