Amazon managed (predefined) policies for CloudWatch
Amazon addresses many common use cases by providing standalone IAM policies that are created and administered by Amazon. These Amazon managed policies grant necessary permissions for common use cases so that you can avoid having to investigate what permissions are needed. For more information, see Amazon managed policies in the IAM User Guide.
The following Amazon managed policies, which you can attach to users in your account, are specific to CloudWatch.
Topics
Amazon managed (predefined) policies for CloudWatch cross-account observability
Amazon managed (predefined) policies for CloudWatch investigations
Amazon managed (predefined) policies for CloudWatch Application Signals
Amazon managed (predefined) policies for CloudWatch Synthetics
Amazon managed (predefined) policies for Amazon CloudWatch RUM
Amazon managed (predefined) policies for CloudWatch Evidently
Amazon managed policy for Amazon Systems Manager Incident Manager
CloudWatch updates to Amazon managed policies
View details about updates to Amazon managed policies for CloudWatch since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the CloudWatch Document history page.
Change | Description | Date |
---|---|---|
CloudWatch updated the CloudWatchApplicationSignalsReadOnlyAccess policy to view how resources and services change in your account and view top observations for service anomalies in your account. |
September 29, 2025 | |
CloudWatch updated the CloudWatchApplicationSignalsFullAccess policy to view how resources and services change in your account and view top observations for service anomalies in your account. |
September 29, 2025 | |
AIOpsAssistantPolicy – Updated policy |
CloudWatch updated the AIOpsAssistantPolicy to allow CloudWatch investigations access to additional resources to assist in queries, troubleshooting, and topology mapping. This policy grants CloudWatch investigations the necessary permissions for conducting investigations. |
September 24, 2025 |
AIOpsConsoleAdminPolicy – Updated policy |
CloudWatch updated the AIOpsConsoleAdminPolicy policy to permit validation of investigation groups across accounts. This policy grants users access to CloudWatch investigations actions, and to additional Amazon actions that are necessary for accessing investigation events. |
June 13, 2025 |
AIOpsOperatorAccess – Updated policy |
CloudWatch updated the AIOpsOperatorAccess policy to permit validation of investigation groups across accounts. This policy grants users access to CloudWatch investigations actions, and to additional Amazon actions that are necessary for accessing investigation events. |
June 13, 2025 |
AIOpsAssistantPolicy – Updates to existing policy |
CloudWatch updated the AIOpsAssistantPolicy IAM policy. It added permissions to enable CloudWatch Application Insights operational investigations to find information in your resources during investigations. The following permissions were added:
Additionally, the |
June 13, 2025 |
AmazonCloudWatchRUMReadOnlyAccess – Updated policy |
CloudWatch added permissions to the AmazonCloudWatchRUMReadOnlyAccess policy. The The The The The The |
June 28, 2025 |
AIOpsReadOnlyAccess – Updated policy |
CloudWatch updated the AIOpsReadOnlyAccess policy to permit validation of investigation groups across accounts. This policy grants a user read-only permissions for Amazon AI Operations and other related services. |
June 5, 2025 |
AmazonCloudWatchRUMReadOnlyAccess – Updated policy |
CloudWatch added a permission to the AmazonCloudWatchRUMReadOnlyAccess policy. The |
April 28, 2025 |
AIOpsConsoleAdminPolicy – New policy |
CloudWatch created a new policy named AIOpsConsoleAdminPolicy. This policy grants users full administrative access for managing CloudWatch investigations, including the management of trusted identity propagation, and the management of IAM Identity Center and organizational access. |
December 3, 2024 |
AIOpsOperatorAccess – New policy |
CloudWatch created a new policy named AIOpsOperatorAccess. This policy grants users access to CloudWatch investigations actions, and to additional Amazon actions that are necessary for accessing investigation events. |
December 3, 2024 |
AIOpsReadOnlyAccess – New policy |
CloudWatch created a new policy named AIOpsReadOnlyAccess. This policy grants a user read-only permissions for Amazon AI Operations and other related services. |
December 3, 2024 |
AIOpsAssistantPolicy – New policy |
CloudWatch created a new policy named AIOpsAssistantPolicy. You don't assign this policy to a user. You assign this policy to the Amazon AI Operations assistant to enable CloudWatch investigations to analyze your Amazon resources during the investigation of operational events. |
December 3, 2024 |
CloudWatchFullAccessV2 – Updates to existing policies |
CloudWatch updated both CloudWatchFullAccessV2 and CloudWatchFullAccess. Permissions for Amazon OpenSearch Service were added to to enable CloudWatch Logs integration with OpenSearch Service for some features. |
December 1, 2024 |
CloudWatchNetworkFlowMonitorServiceRolePolicy – New policy |
CloudWatch added a new policy CloudWatchNetworkFlowMonitorServiceRolePolicy. The CloudWatchNetworkFlowMonitorServiceRolePolicy grants permissions for Network Flow Monitor to publish metrics to CloudWatch. It also allows the service to use Amazon Organizations to get information for multi-account scenarios. |
December 1, 2024 |
CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy – New policy |
CloudWatch added a new policy CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy. The CloudWatchNetworkFlowMonitorTopologyServiceRolePolicy grants permissions for Network Flow Monitor to generate topology snapshots of resources used in your account. |
December 1, 2024 |
CloudWatchNetworkFlowMonitorAgentPublishPolicy – New policy |
CloudWatch added a new policy CloudWatchNetworkFlowMonitorAgentPublishPolicy. The CloudWatchNetworkFlowMonitorAgentPublishPolicy grants permissions for resources, such as Amazon EC2 and Amazon EKS instances, to send telemetry reports (metrics) to a Network Flow Monitor endpoint. |
December 1, 2024 |
CloudWatchSyntheticsFullAccess – Update to an existing policy |
CloudWatch updated the policy named CloudWatchSyntheticsFullAccess. The following CloudWatch Logs actions have been added to allow CloudWatch
Synthetics to get and use canary log data in Lambda log groups. The
Additionally, Lambda layer version actions now apply to all CloudWatch Synthetics layer ARNs. |
November 20, 2024 |
CloudWatchInternetMonitorReadOnlyAccess – New CloudWatchInternetMonitorReadOnlyAccess. This policy grants read only access to resources and actions
available in the CloudWatch console for Internet Monitor. The scope of this policy
includes |
November 14, 2024 | |
CloudWatchInternetMonitorFullAccess – New policy |
CloudWatch created a new policy named CloudWatchInternetMonitorFullAccess. This policy grants full access to resources and actions available
in the CloudWatch console for Internet Monitor. The scope of this policy includes
|
October 23, 2024 |
CloudWatchLambdaApplicationSignalsExecutionRolePolicy – New CloudWatchLambdaApplicationSignalsExecutionRolePolicy. This policy is used when CloudWatch Application Signals is enabled for Lambda workloads. It enables write access to X-Ray and the log group used by CloudWatch Application Signals. |
October 16, 2024 | |
CloudWatchSyntheticsFullAccess – Update to an existing policy |
CloudWatch updated the policy named CloudWatchSyntheticsFullAccess. The |
October 11, 2024 |
CloudWatchApplicationSignalsReadOnlyAccess – New policy |
CloudWatch created a new policy named CloudWatchApplicationSignalsReadOnlyAccess. This policy grants read only access to resources and actions
available in the CloudWatch console for Application Signals. The scope of
this policy includes |
June 7, 2024 |
CloudWatchApplicationSignalsFullAccess – New policy |
CloudWatch created a new policy named CloudWatchApplicationSignalsFullAccess. This policy grants full access to resources and actions available
in the CloudWatch console for Application Signals. The scope of this
policy includes |
June 7, 2024 |
CloudWatchFullAccessV2 – Update to an existing policy |
CloudWatch updated the policy named CloudWatchFullAccessV2. The scope of the |
May 20, 2024 |
CloudWatchReadOnlyAccess – Update to an existing policy |
CloudWatch updated the policy named CloudWatchReadOnlyAccess. The scope of the |
May 20, 2024 |
CloudWatchApplicationSignalsServiceRolePolicy – Update to an existing policy |
CloudWatch updated the policy named CloudWatchApplicationSignalsServiceRolePolicy. The scoping of the |
April 18, 2024 |
CloudWatchApplicationSignalsServiceRolePolicy – Update to an existing policy |
CloudWatch changed the scope of a permission in CloudWatchApplicationSignalsServiceRolePolicy. The scope of the |
April 08, 2024 |
CloudWatchFullAccessV2 – Update to an existing policy |
CloudWatch added permissions to CloudWatchFullAccessV2. Existing permissions for CloudWatch Synthetics, X-Ray, and CloudWatch RUM actions and new permissions for CloudWatch Application Signals were added so that users with this policy can manage CloudWatch Application Signals. The permission to create the CloudWatch Application Signals service-linked role was added to allow CloudWatch Application Signals to discover telemetry data in logs, metrics, traces, and tags. |
December 5, 2023 |
CloudWatchReadOnlyAccess – Update to an existing policy |
CloudWatch added permissions to CloudWatchReadOnlyAccess. Existing read-only permissions for CloudWatch Synthetics, X-Ray, and CloudWatch RUM actions and new read-only permissions for CloudWatch Application Signals were added so that users with this policy can triage and dignose their service health issues as reported by CloudWatch Application Signals. The |
December 5, 2023 |
CloudWatchReadOnlyAccess – Update to an existing policy. |
CloudWatch added a permission to CloudWatchReadOnlyAccess. The |
December 01, 2023 |
CloudWatchApplicationSignalsServiceRolePolicy – New policy |
CloudWatch added a new policy CloudWatchApplicationSignalsServiceRolePolicy. The CloudWatchApplicationSignalsServiceRolePolicy grants an upcoming feature permissions to collect CloudWatch Logs data, X-Ray trace data, CloudWatch metrics data, and tagging data. |
November 9, 2023 |
AWSServiceRoleForCloudWatchMetrics_DbPerfInsightsServiceRolePolicy – New policy |
CloudWatch added a new policy AWSServiceRoleForCloudWatchMetrics_DbPerfInsightsServiceRolePolicy. The AWSServiceRoleForCloudWatchMetrics_DbPerfInsightsServiceRolePolicy grants permission to CloudWatch to fetch Performance Insights metrics from databases on your behalf. |
September 20, 2023 |
CloudWatchReadOnlyAccess – Update to an existing policy |
CloudWatch added a permission to CloudWatchReadOnlyAccess. The |
September 14, 2023 |
CloudWatchFullAccessV2 – New policy |
CloudWatch added a new policy CloudWatchFullAccessV2. The CloudWatchFullAccessV2 grants full access to CloudWatch actions and resources while better scoping the permissions granted to other services such as Amazon SNS and Amazon EC2 Auto Scaling. For more information, see CloudWatchFullAccessV2. |
August 1, 2023 |
AWSServiceRoleForInternetMonitor – Update to an existing policy |
Amazon CloudWatch Internet Monitor added new permissions to monitor Network Load Balancer resources. The For more information, see Using Internet Monitor. |
July 15, 2023 |
CloudWatchReadOnlyAccess – Update to an existing policy |
CloudWatch added permissions to CloudWatchReadOnlyAccess. The |
June 6, 2023 |
CloudWatchCrossAccountSharingConfiguration – New policy |
CloudWatch added a new policy to enable you to manage CloudWatch cross-account observability links that share CloudWatch metrics. For more information, see CloudWatch cross-account observability. |
November 27, 2022 |
OAMFullAccess – New policy |
CloudWatch added a new policy to enable you to fully manage CloudWatch cross-account observability links and sinks. For more information, see CloudWatch cross-account observability. |
November 27, 2022 |
OAMReadOnlyAccess – New policy |
CloudWatch added a new policy to enable you to view information about CloudWatch cross-account observability links and sinks. For more information, see CloudWatch cross-account observability. |
November 27, 2022 |
CloudWatchFullAccess – Update to an existing policy |
CloudWatch added permissions to CloudWatchFullAccess. The |
November 27, 2022 |
CloudWatchReadOnlyAccess – Update to an existing policy |
CloudWatch added permissions to CloudWatchReadOnlyAccess. The |
November 27, 2022 |
AmazonCloudWatchRUMServiceRolePolicy – Update to an existing policy |
CloudWatch RUM updated a condition key in AmazonCloudWatchRUMServiceRolePolicy. The
|
February 2, 2023 |
AmazonCloudWatchRUMReadOnlyAccess – Updated policy |
CloudWatch added permissions the AmazonCloudWatchRUMReadOnlyAccess policy. The |
October 27, 2022 |
AmazonCloudWatchRUMServiceRolePolicy – Update to an existing policy |
CloudWatch RUM added permissions to AmazonCloudWatchRUMServiceRolePolicy. The |
October 26, 2022 |
CloudWatchEvidentlyReadOnlyAccess – Update to an existing policy |
CloudWatch Evidently added permissions to CloudWatchEvidentlyReadOnlyAccess. The |
August 12, 2022 |
CloudWatchSyntheticsFullAccess – Update to an existing policy |
CloudWatch Synthetics added permissions to CloudWatchSyntheticsFullAccess. The |
May 6, 2022 |
AmazonCloudWatchRUMFullAccess – New policy |
CloudWatch added a new policy to enable full management of CloudWatch RUM. CloudWatch RUM allows you to perform real user monitoring of your web application. For more information, see CloudWatch RUM. |
November 29, 2021 |
AmazonCloudWatchRUMReadOnlyAccess – New policy |
CloudWatch added a new policy to enable read-only access to CloudWatch RUM. CloudWatch RUM allows you to perform real user monitoring of your web application. For more information, see CloudWatch RUM. |
November 29, 2021 |
CloudWatchEvidentlyFullAccess – New policy |
CloudWatch added a new policy to enable full management of CloudWatch Evidently. CloudWatch Evidently allows you to perform A/B experiments of your web applications, and to roll them out gradually. For more information, see Perform launches and A/B experiments with CloudWatch Evidently. |
November 29, 2021 |
CloudWatchEvidentlyReadOnlyAccess – New policy |
CloudWatch added a new policy to enable read-only access to CloudWatch Evidently. CloudWatch Evidently allows you to perform A/B experiments of your web applications, and to roll them out gradually. For more information, see Perform launches and A/B experiments with CloudWatch Evidently. |
November 29, 2021 |
AWSServiceRoleForCloudWatchRUM – New managed policy |
CloudWatch added a policy for a new service-linked role to allow CloudWatch RUM to pubish monitoring data to other relevant Amazon services. |
November 29, 2021 |
CloudWatchSyntheticsFullAccess – Update to an existing policy |
CloudWatch Synthetics added permissions to CloudWatchSyntheticsFullAccess, and also changed the scope of one permission. The The |
September 29, 2021 |
CloudWatchSyntheticsFullAccess – Update to an existing policy |
CloudWatch Synthetics added a permission to CloudWatchSyntheticsFullAccess. The |
July 20, 2021 |
AWSCloudWatchAlarms_ActionSSMIncidentsServiceRolePolicy – New managed policy |
CloudWatch added a new managed IAM policy to allow CloudWatch to create incidents in Amazon Systems Manager Incident Manager. |
May 10, 2021 |
CloudWatchAutomaticDashboardsAccess – Update to an existing policy |
CloudWatch added a permission to the
CloudWatchAutomaticDashboardsAccess managed
policy. The |
April 20, 2021 |
CloudWatch started tracking changes |
CloudWatch started tracking changes for its Amazon managed policies. |
April 14, 2021 |
CloudWatchFullAccessV2
Amazon recently added the CloudWatchFullAccessV2 managed IAM policy. This policy grants full access to CloudWatch actions and resources and also more properly scopes the permissions granted for other services such as Amazon SNS and Amazon EC2 Auto Scaling. We recommend that you begin using this policy instead of using CloudWatchFullAccess. Amazon plans to deprecate CloudWatchFullAccess in the near future.
It includes application-signals:
permissions so that users can access
all the functionality from the CloudWatch console under Application Signals. It includes
some autoscaling:Describe
permissions so that users with this policy
can see the Auto Scaling actions that are associated with CloudWatch alarms. It includes some
sns
permissions so that users with this policy can retrieve create
Amazon SNS topics and associate them with CloudWatch alarms. It includes IAM permissions so
that users with this policy can view information about service-linked roles
associated with CloudWatch. It includes the oam:ListSinks
and
oam:ListAttachedLinks
permissions so that users with this policy
can use the console to view data shared from source accounts in CloudWatch cross-account
observability.
It includes Amazon OpenSearch Service permissions to support vended logs dashboards in CloudWatch Logs, which are created with Amazon OpenSearch Service analytics.
It includes rum
, synthetics
, and xray
permissions so that users can have full access to CloudWatch Synthetics, Amazon X-Ray, and
CloudWatch RUM, all of which are under the CloudWatch service.
To see the full contents of the policy, see CloudWatchFullAccessV2 in the Amazon Managed Policy Reference Guide.
CloudWatchFullAccess
The CloudWatchFullAccess policy is on the path to deprecation. We recommend that you stop using it, and use CloudWatchFullAccessV2 instead.
CloudWatchReadOnlyAccess
The CloudWatchReadOnlyAccess policy grants read-only access to CloudWatch and related observability features.
The policy includes some logs:
permissions, so that users with this
policy can use the console to view CloudWatch Logs information and CloudWatch Logs Insights queries. It
includes autoscaling:Describe*
, so that users with this policy can see
the Auto Scaling actions that are associated with CloudWatch alarms. It includes the
application-signals:
permissions so that users can use Application
Signals to monitor the health of their services. It includes
application-autoscaling:DescribeScalingPolicies
, so that users with
this policy can access information about Application Auto Scaling policies. It includes
sns:Get*
and sns:List*
, so that users with this policy
can retrieve information about the Amazon SNS topics that receive notifications about
CloudWatch alarms. It includes the oam:ListSinks
and
oam:ListAttachedLinks
permissions, so that users with this policy
can use the console to view data shared from source accounts in CloudWatch cross-account
observability. It includes the iam:GetRole
permissions so that users
can check if CloudWatch Application Signals have been set up.
It includes rum
, synthetics
, and xray
permissions so that users can have read-only access to CloudWatch Synthetics, Amazon X-Ray,
and CloudWatch RUM, all of which are under the CloudWatch service.
To see the full contents of the policy, see CloudWatchReadOnlyAccess in the Amazon Managed Policy Reference Guide.
CloudWatchActionsEC2Access
The CloudWatchActionsEC2Access policy grants read-only access to CloudWatch alarms and metrics in addition to Amazon EC2 metadata. It also grants access to the Stop, Terminate, and Reboot API actions for EC2 instances.
To see the full contents of the policy, see CloudWatchActionsEC2Access in the Amazon Managed Policy Reference Guide.
CloudWatch-CrossAccountAccess
The CloudWatch-CrossAccountAccess managed policy is used by the CloudWatch-CrossAccountSharingRole IAM role. This role and policy enable users of cross-account dashboards to view automatic dashboards in each account that is sharing dashboards.
To see the full contents of the policy, see CloudWatch-CrossAccountAccess in the Amazon Managed Policy Reference Guide.
CloudWatchAutomaticDashboardsAccess
The CloudWatchAutomaticDashboardsAccess managed policy grants access to CloudWatch for non-CloudWatch APIs, so that resources such as Lambda functions can be displayed on CloudWatch automatic dashboards.
To see the full contents of the policy, see CloudWatchAutomaticDashboardsAccess in the Amazon Managed Policy Reference Guide.
CloudWatchAgentServerPolicy
The CloudWatchAgentServerPolicy policy can be used in IAM roles that are attached to Amazon EC2 instances to allow the CloudWatch agent to read information from the instance and write it to CloudWatch.
To see the full contents of the policy, see CloudWatchAgentServerPolicy in the Amazon Managed Policy Reference Guide.
CloudWatchAgentAdminPolicy
The CloudWatchAgentAdminPolicy policy can be used in IAM roles that are attached to Amazon EC2 instances. This policy allows the CloudWatch agent to read information from the instance and write it to CloudWatch, and also to write information to Parameter Store.
To see the full contents of the policy, see CloudWatchAgentAdminPolicy in the Amazon Managed Policy Reference Guide.
Note
You can review these permissions policies by signing in to the IAM console and searching for specific policies there.
You can also create your own custom IAM policies to allow permissions for CloudWatch actions and resources. You can attach these custom policies to the IAM users or groups that require those permissions.
Amazon managed (predefined) policies for CloudWatch cross-account observability
The policies in this section grant permissions related to CloudWatch cross-account observability. For more information, see CloudWatch cross-account observability.
CloudWatchCrossAccountSharingConfiguration
The CloudWatchCrossAccountSharingConfiguration policy grants access to create, manage, and view Observability Access Manager links for sharing CloudWatch resources between accounts. For more information, see CloudWatch cross-account observability.
To see the full contents of the policy, see CloudWatchCrossAccountSharingConfiguration in the Amazon Managed Policy Reference Guide.
OAMFullAccess
The OAMFullAccess policy grants access to create, manage, and view Observability Access Manager sinks and links, which are used for CloudWatch cross-account observability.
The OAMFullAccess policy by itself does not permit you to share observability data across links. To create a link to share CloudWatch metrics, you also need either CloudWatchFullAccess or CloudWatchCrossAccountSharingConfiguration. To create a link to share CloudWatch Logs log groups, you also need either CloudWatchLogsFullAccess or CloudWatchLogsCrossAccountSharingConfiguration. To create a link to share X-Ray traces, you also need either AWSXRayFullAccess or AWSXRayCrossAccountSharingConfiguration.
For more information, see CloudWatch cross-account observability.
To see the full contents of the policy, see OAMFullAccess in the Amazon Managed Policy Reference Guide.
OAMReadOnlyAccess
The OAMReadOnlyAccess policy grants read-only access to Observability Access Manager resources, which are used for CloudWatch cross-account observability. For more information, see CloudWatch cross-account observability.
To see the full contents of the policy, see OAMReadOnlyAccess in the Amazon Managed Policy Reference Guide.
Amazon managed (predefined) policies for CloudWatch investigations
The policies in this section grant permissions related to CloudWatch investigations. For more information, see CloudWatch investigations.
AIOpsConsoleAdminPolicy
The AIOpsConsoleAdminPolicy policy grants full access to all CloudWatch investigations actions and their required permissions via the Amazon console. This policy also grants limited access to other service's APIs required for CloudWatch investigations functionality.
-
The
aiops
permissions grant access to all CloudWatch investigations actions. -
The
organizations
,sso
,identitystore
, andsts
permissions allow actions needed for IAM Identity Center management which facilitate identity-aware sessions. -
The
ssm
permissions are required for SSM Ops Item integration with third-party issue management. -
The
iam
permissions are needed so that administrators can pass IAM roles to theaiops
andssm.integrations
services, and the role is later used by the assistant to analyze Amazon resourcesImportant
These permissions allow users with this policy to pass any IAM role to the
aiops
andssm.integrations
services. -
It allows APIs from services outside CloudWatch investigations, which are required for investigation feature functionality. These include actions to configure Amazon Q Developer in chat applications, Amazon KMS, CloudTrail trails, and SSM third-party issue management.
To see the full contents of the policy, see AIOpsConsoleAdminPolicy in the Amazon Managed Policy Reference Guide.
AIOpsOperatorAccess
The AIOpsOperatorAccess policy grants access to a limited set of CloudWatch investigations APIs which include creating, updating, and deleting investigations, investigation events, and investigation resources.
This policy only provides access to investigations. You should be sure that IAM principals with this policy also have permissions to read CloudWatch observability data such as metrics, SLOs, and CloudWatch Logs query results.
-
The
aiops
permissions allow access to CloudWatch investigations APIs to create, update, and delete investigations. -
The
sso
,identitystore
, andsts
permissions allow actions needed for IAM Identity Center management which facilitate identity-aware sessions. -
The
ssm
permissions are required for SSM Ops Item integration with third-party issue management.
To see the full contents of the policy, see AIOpsOperatorAccess in the Amazon Managed Policy Reference Guide.
AIOpsReadOnlyAccess
The AIOpsReadOnlyAccess policy grants read-only permissions for CloudWatch investigations and other related services.
-
The
aiops
permissions allow access to CloudWatch investigations APIs to get, list, and validate investigation groups. -
The
sso
permissions allow actions needed for IAM Identity Center management which facilitate identity-aware sessions. -
The
ssm
permissions are required for SSM Ops Item integration with third-party issue management.
To see the full contents of the policy, see AIOpsReadOnlyAccess in the Amazon Managed Policy Reference Guide.
IAM policy for CloudWatch investigations (AIOpsAssistantPolicy)
The AIOpsAssistantPolicy policy is not to be assigned to users or administrators. Instead, it is assigned AIOpsAssistantPolicy to Amazon AI Operations to enable it to analyze your Amazon resources during investigations of operational events. This policy is scoped based on the resources that CloudWatch investigations supports during investigations, and will be updated as more resources are supported.
You can also choose to assign the general Amazon ReadOnlyAccess to the assistant in addition to assigning it AIOpsAssistantPolicy. The reason to do this is that ReadOnlyAccess will be updated more frequently by Amazon with permissions for new Amazon services and actions that are released. The AIOpsAssistantPolicy will also be updated for new actions, but not as frequently.
To see the full contents of the policy, see AIOpsAssistantPolicy in the Amazon Managed Policy Reference Guide.
Amazon managed (predefined) policies for CloudWatch Application Signals
The policies in this section grant permissions related to CloudWatch Application Signals. For more information, see Application Signals.
CloudWatchApplicationSignalsReadOnlyAccess
Amazon has added the
CloudWatchApplicationSignalsReadOnlyAccess managed
IAM policy. This policy grants read only access to actions and resources
available to users in the CloudWatch console under Application Signals. It includes
application-signals:
policies so that users can use CloudWatch
Application signals to view, investigate and monitor the health of their
services. It includes an iam:GetRole
policy to allow users to
retrieve information about an IAM role. It includes logs:
policies to start and stop queries, retrieve the configuration for a metruc
filter, and obtain query results. It includes cloudwatch:
policies
so that users can obtain information about a CloudWatch alarm or metrics. It includes
synthetics:
policies so that users can retrieve information
about synthetics canary runs. It includes rum:
policies to run
batch operations, retrieve data, and update metrics definitions for RUM clients.
It includes an xray:
policy to retrieve trace summaries.
To see the full contents of the policy, see CloudWatchApplicationSignalsReadOnlyAccess in the Amazon Managed Policy Reference Guide.
CloudWatchApplicationSignalsFullAccess
Amazon has added the
CloudWatchApplicationSignalsFullAccess managed IAM
policy. This policy grants access to all actions and resources available to
users in the CloudWatch console. It includes application-signals:
policies so that users can use CloudWatch Application signals to view, investigate and
monitor the health of their services. It uses cloudwatch:
policies
to retrieve data from metrics and alarms. It uses logs:
policies to
manage queries and filters. It uses synthetics:
policies so that
users can retrieve information about synthetics canary runs. It includes
rum:
policies to run batch operations, retrieve data and update
metrics definitions for RUM clients. It includes an xray:
policy to
retrieve trace summaries. It includes arn:aws:cloudwatch:*:*:alarm:
policies so that users can retrieve information about a service level objective
(SLO) alarm. It includes iam:
policies to manage IAM roles. It
uses sns:
policies to create, list, and subscribe to an Amazon SNS
topic.
To see the full contents of the policy, see CloudWatchApplicationSignalsFullAccess in the Amazon Managed Policy Reference Guide.
CloudWatchLambdaApplicationSignalsExecutionRolePolicy
This policy is used when CloudWatch Application Signals is enabled for Lambda workloads. It enables write access to X-Ray and the log group used by CloudWatch Application Signals.
To see the full contents of the policy, see CloudWatchLambdaApplicationSignalsExecutionRolePolicy in the Amazon Managed Policy Reference Guide.
Amazon managed (predefined) policies for CloudWatch Synthetics
The CloudWatchSyntheticsFullAccess and CloudWatchSyntheticsReadOnlyAccess Amazon managed policies are available for you to assign to users who will manage or use CloudWatch Synthetics. The following additional policies are also relevant:
-
AmazonS3ReadOnlyAccess and CloudWatchReadOnlyAccess – These are necessary to read all Synthetics data in the CloudWatch console.
-
AWSLambdaReadOnlyAccess – Required to view the source code used by canaries.
-
CloudWatchSyntheticsFullAccess – Allows you to create canaries. Additionally, to create and delete canaries that have a new IAM role created for them, you need specific inline policy permissions.
Important
Granting a user the
iam:CreateRole
,iam:DeleteRole
,iam:CreatePolicy
,iam:DeletePolicy
,iam:AttachRolePolicy
, andiam:DetachRolePolicy
permissions gives that user full administrative access to create, attach, and delete roles and policies that have ARNs that matcharn:aws:iam::*:role/service-role/CloudWatchSyntheticsRole*
andarn:aws:iam::*:policy/service-role/CloudWatchSyntheticsPolicy*
. For example, a user with these permissions can create a policy that has full permissions for all resources, and attach that policy to any role that matches that ARN pattern. Be careful to whom you grant these permissions.For information about attaching policies and granting permissions to users, see Changing Permissions for an IAM User and To embed an inline policy for a user or role.
CloudWatchSyntheticsFullAccess
To see the full contents of the policy, see CloudWatchSyntheticsFullAccess in the Amazon Managed Policy Reference Guide.
CloudWatchSyntheticsReadOnlyAccess
To see the full contents of the policy, see CloudWatchSyntheticsReadOnlyAccess in the Amazon Managed Policy Reference Guide.
Amazon managed (predefined) policies for Amazon CloudWatch RUM
The AmazonCloudWatchRUMFullAccess and AmazonCloudWatchRUMReadOnlyAccess Amazon managed policies are available for you to assign to users who will manage or use CloudWatch RUM.
AmazonCloudWatchRUMFullAccess
To see the full contents of the policy, see AmazonCloudWatchRUMFullAccess in the Amazon Managed Policy Reference Guide.
AmazonCloudWatchRUMReadOnlyAccess
The AmazonCloudWatchRUMReadOnlyAccess allows read-only administrative access to CloudWatch RUM.
-
The
synthetics
permission allows displaying associated Synthetics Canaries to the RUM app monitor -
The
cloudwatch
permission allows displaying associated CloudWatch metrics to the RUM app monitor -
The
cloudwatch alarms
permission allows displaying associated CloudWatch alarms to the RUM app monitor -
The
cloudwatch logs
permission allows displaying associated CloudWatch logs to the RUM app monitor -
The
x-ray
permission allows displaying associated X-Ray Trace segments to the RUM app monitor -
The
rum
permission allows displaying associated tags to the RUM app monitor
To see the full contents of the policy, see AmazonCloudWatchRUMReadOnlyAccess in the Amazon Managed Policy Reference Guide.
AmazonCloudWatchRUMServiceRolePolicy
You can't attach AmazonCloudWatchRUMServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role that allows CloudWatch RUM to publish monitoring data to other relevant Amazon services. For more information about this service linked role, see Using service-linked roles for CloudWatch RUM.
To see the full contents of the policy, see AmazonCloudWatchRUMServiceRolePolicy in the Amazon Managed Policy Reference Guide.
Amazon managed (predefined) policies for CloudWatch Evidently
The CloudWatchEvidentlyFullAccess and CloudWatchEvidentlyReadOnlyAccess Amazon managed policies are available for you to assign to users who will manage or use CloudWatch Evidently.
CloudWatchEvidentlyFullAccess
To see the full contents of the policy, see CloudWatchEvidentlyFullAccess in the Amazon Managed Policy Reference Guide.
CloudWatchEvidentlyReadOnlyAccess
To see the full contents of the policy, see CloudWatchEvidentlyReadOnlyAccess in the Amazon Managed Policy Reference Guide.
Amazon managed policy for Amazon Systems Manager Incident Manager
The AWSCloudWatchAlarms_ActionSSMIncidentsServiceRolePolicy policy is attached to a service-linked role that allows CloudWatch to start incidents in Amazon Systems Manager Incident Manager on your behalf. For more information, see Service-linked role permissions for CloudWatch alarms Systems Manager Incident Manager actions.
The policy has the following permission:
-
ssm-incidents:StartIncident