

# Amazon Billing policy examples
<a name="billing-example-policies"></a>

**Note**  
The following Amazon Identity and Access Management (IAM) actions have reached the end of standard support:  
`aws-portal` namespace
`purchase-orders:ViewPurchaseOrders`
`purchase-orders:ModifyPurchaseOrders`
If you're using Amazon Organizations, you can use the [bulk policy migrator scripts](migrate-iam-permissions.md) or bulk policy migrator to update polices from your payer account. You can also use the [old to granular action mapping reference](migrate-granularaccess-iam-mapping-reference.md) to verify the IAM actions that need to be added.  
If you have an Amazon Web Services account, or are a part of an Amazon Organizations created on or after November 16, 2023, 11:00 AM (PDT), the fine-grained actions are already in effect in your organization.

**Important**  
These policies require that you activate IAM user access to the Billing and Cost Management console on the [Account Settings](https://console.amazonaws.cn/billing/home#/account) console page. For more information, see [Activating access to the Billing and Cost Management console](control-access-billing.md#ControllingAccessWebsite-Activate).
To use Amazon managed policies, see [Amazon managed policies](managed-policies.md).

This topic contains example policies that you can attach to your IAM user or group to control access to your account's billing information and tools. The following basic rules apply to IAM policies for Billing and Cost Management:
+ `Version` is always `2012-10-17 `.
+ `Effect` is always `Allow` or `Deny`.
+ `Action` is the name of the action or a wildcard (`*`). 

  The action prefix is `budgets` for Amazon Budgets, `cur` for Amazon Cost and Usage Reports, `aws-portal` for Amazon Billing, or `ce` for Cost Explorer.
+ `Resource` is always `*` for Amazon Billing.

  For actions that are performed on a `budget` resource, specify the budget Amazon Resource Name (ARN).
+ It's possible to have multiple statements in one policy.

For a list of actions policies for the Amazon Cost Management console, see [Amazon Cost Management policy examples](https://docs.amazonaws.cn/cost-management/latest/userguide/billing-example-policies.html) in the *Amazon Cost Management user guide*.

**Topics**
+ [Allow IAM users to view your billing information](#example-billing-view-billing-only)
+ [Allow IAM users to view your billing information and carbon footprint report](#example-ccft-policy)
+ [Allow IAM users to access the reports console page](#example-billing-view-reports)
+ [Deny IAM users access to the Billing and Cost Management consoles](#example-billing-deny-all)
+ [Deny Amazon Console cost and usage widget access for member accounts](#example-billing-deny-widget)
+ [Deny Amazon Console cost and usage widget access for specific IAM users and roles](#example-billing-deny-ce)
+ [Allow IAM users to view your billing information, but deny access to carbon footprint report](#example-ccft-policy-deny)
+ [Allow IAM users to access carbon footprint reporting, but deny access to billing information](#example-ccft-policy-allow)
+ [Allow full access to Amazon services but deny IAM users access to the Billing and Cost Management consoles](#ExampleAllowAllDenyBilling)
+ [Allow IAM users to view the Billing and Cost Management consoles except for account settings](#example-billing-read-only)
+ [Allow IAM users to modify billing information](#example-billing-deny-modifybilling)
+ [Deny access to account settings, but allow full access to all other billing and usage information](#example-billing-deny-modifyaccount)
+ [Deposit reports into an Amazon S3 bucket](#example-billing-s3-bucket)
+ [Find products and prices](#example-policy-pe-api)
+ [View costs and usage](#example-policy-ce-api)
+ [Enable and disable Amazon Regions](#enable-disable-regions)
+ [View and manage cost categories](#example-policy-cc-api)
+ [Create, view, edit, or delete Amazon Cost and Usage Reports](#example-policy-report-definition)
+ [View and manage purchase orders](#example-view-manage-purchaseorders)
+ [View and update the Cost Explorer preferences page](#example-view-update-ce)
+ [View, create, update, and delete using the Cost Explorer reports page](#example-view-ce-reports)
+ [View, create, update, and delete reservation and Savings Plans alerts](#example-view-ce-expiration)
+ [Allow read-only access to Amazon Cost Anomaly Detection](#example-policy-ce-ad)
+ [Allow Amazon Budgets to apply IAM policies and SCPs](#example-budgets-IAM-SCP)
+ [Allow Amazon Budgets to apply IAM policies and SCPs and target EC2 and RDS instances](#example-budgets-applySCP)
+ [Allow IAM users to view, create, and update your Fapiao settings information](#example-budgets-fapiao)
+ [Allow IAM users to view US tax exemptions and create Amazon Web Services Support cases](#example-awstaxexemption)
+ [Allow IAM users to view and update your real name information](#example-budgets-realname)
+ [(For customers with a billing or contact address in India) Allow read-only access to customer verification information](#example-aispl-verification)
+ [(For customers with a billing or contact address in India) View, create, and update customer verification information](#example-aispl-verification-view)
+ [View Amazon Migration Acceleration Program information in the Billing console](#read-only-migration-acceleration-program-policy)
+ [Allow access to Amazon invoice configuration in the Billing console](#invoice-config-policy)

## Allow IAM users to view your billing information
<a name="example-billing-view-billing-only"></a>

To allow an IAM user to view your billing information without giving the IAM user access to sensitive account information, use a policy similar to the following example policy. Such a policy prevents users from accessing your password and account activity reports. This policy allows IAM users to view the following Billing and Cost Management console pages, without giving them access to the **Account Settings** or **Reports** console pages:
+ **Dashboard**
+ **Cost Explorer**
+ **Bills**
+ **Orders and invoices**
+ **Consolidated Billing**
+ **Preferences**
+ **Credits**
+ **Advance Payment**

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "aws-portal:ViewBilling",
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to view your billing information and carbon footprint report
<a name="example-ccft-policy"></a>

To allow an IAM user to view both billing information and carbon footprint reporting, use a policy similar to the following example. This policy prevents users from accessing your password and account activity reports. This policy allows IAM users to view the following Billing and Cost Management console pages, without giving them access to the **Account Settings** or **Reports** console pages:
+ **Dashboard**
+ **Cost Explorer**
+ **Bills**
+ **Orders and invoices**
+ **Consolidated Billing**
+ **Preferences**
+ **Credits**
+ **Advance Payment**
+ **The Amazon Customer Carbon Footprint Tool section of the Amazon Cost and Usage Reports page**

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {"Effect": "Allow",
            "Action": "aws-portal:ViewBilling",
            "Resource": "*"
        },
        {"Effect": "Allow",
            "Action": "sustainability:GetCarbonFootprintSummary",
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to access the reports console page
<a name="example-billing-view-reports"></a>

To allow an IAM user to access the **Reports** console page and to view the usage reports that contain account activity information, use a policy similar to this example policy.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions).

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewUsage",
                "aws-portal:ViewBilling",
                "cur:DescribeReportDefinitions",
                "cur:PutReportDefinition",
                "cur:DeleteReportDefinition",
                "cur:ModifyReportDefinition"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## Deny IAM users access to the Billing and Cost Management consoles
<a name="example-billing-deny-all"></a>

To explicitly deny an IAM user access to the all Billing and Cost Management console pages, use a policy similar to this example policy.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Deny",
            "Action": "aws-portal:*",
            "Resource": "*"
        }
    ]
}
```

------

## Deny Amazon Console cost and usage widget access for member accounts
<a name="example-billing-deny-widget"></a>

To restrict member (linked) account access to cost and usage data, use your management (payer) account to access the Cost Explorer preferences tab and uncheck **Linked Account Access**. This will deny access to cost and usage data from the Cost Explorer (Amazon Cost Management) console, Cost Explorer API, and Amazon Console Home page's cost and usage widget regardless of the IAM actions a member account’s IAM user or role has.

## Deny Amazon Console cost and usage widget access for specific IAM users and roles
<a name="example-billing-deny-ce"></a>

To deny Amazon Console cost and usage widget access for specific IAM users and roles, use the permissions policy below.

**Note**  
Adding this policy to an IAM user or role will deny users access to Cost Explorer (Amazon Cost Management) console and Cost Explorer APIs as well.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Deny",
            "Action": "ce:*",
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to view your billing information, but deny access to carbon footprint report
<a name="example-ccft-policy-deny"></a>

To allow an IAM user to both billing information in the Billing and Cost Management consoles, but doesn't allow access to the Amazon Customer Carbon Footprint Tool. This tool is located in the Amazon Cost and Usage Reports page.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {"Effect": "Allow",
            "Action": "aws-portal:ViewBilling",
            "Resource": "*"
        },
        {"Effect": "Deny",
            "Action": "sustainability:GetCarbonFootprintSummary",
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to access carbon footprint reporting, but deny access to billing information
<a name="example-ccft-policy-allow"></a>

To allow an IAM users to access the Amazon Customer Carbon Footprint Tool in the Amazon Cost and Usage Reports page, but denies access to view billing information in the Billing and Cost Management consoles.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {"Effect": "Deny",
            "Action": "aws-portal:ViewBilling",
            "Resource": "*"
        },
        {"Effect": "Allow",
            "Action": "sustainability:GetCarbonFootprintSummary",
            "Resource": "*"
        }
    ]
}
```

------

## Allow full access to Amazon services but deny IAM users access to the Billing and Cost Management consoles
<a name="ExampleAllowAllDenyBilling"></a>

To deny IAM users access to everything on the Billing and Cost Management console, use the following policy. Deny user access to Amazon Identity and Access Management (IAM) to prevent access to the policies that control access to billing information and tools.

**Important**  
This policy doesn't allow any actions. Use this policy in combination with other policies that allow specific actions.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Deny",
            "Action": [
                "aws-portal:*",
                "iam:*"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to view the Billing and Cost Management consoles except for account settings
<a name="example-billing-read-only"></a>

This policy allows read-only access to all of the Billing and Cost Management console. This includes the **Payments Method** and **Reports** console pages. However, this policy denies access to the **Account Settings** page. This means it protects the account password, contact information, and security questions. 

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "aws-portal:View*",
            "Resource": "*"
        },
        {
            "Effect": "Deny",
            "Action": "aws-portal:*Account",
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to modify billing information
<a name="example-billing-deny-modifybilling"></a>

To allow IAM users to modify account billing information in the Billing and Cost Management console, allow IAM users to view your billing information. The following policy example allows an IAM user to modify the **Consolidated Billing**, **Preferences**, and **Credits** console pages. It also allows an IAM user to view the following Billing and Cost Management console pages:
+ **Dashboard**
+ **Cost Explorer**
+ **Bills**
+ **Orders and invoices**
+ **Advance Payment**

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "aws-portal:*Billing",
            "Resource": "*"
        }
    ]
}
```

------

## Deny access to account settings, but allow full access to all other billing and usage information
<a name="example-billing-deny-modifyaccount"></a>

To protect your account password, contact information, and security questions, deny IAM user access to **Account Settings** while still enabling full access to the rest of the functionality in the Billing and Cost Management console. The following is an example policy.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "aws-portal:*Billing",
                "aws-portal:*Usage",
                "aws-portal:*PaymentMethods"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Deny",
            "Action": "aws-portal:*Account",
            "Resource": "*"
        }
    ]
}
```

------

## Deposit reports into an Amazon S3 bucket
<a name="example-billing-s3-bucket"></a>

The following policy allows Billing and Cost Management to save your detailed Amazon bills to an Amazon S3 bucket if you own both the Amazon account and the Amazon S3 bucket. This policy must be applied to the Amazon S3 bucket, rather than an IAM user. This is because it's a resource-based policy, not a user-based policy. We recommend that you deny IAM user access to the bucket for IAM users who don't need access to your bills.

Replace *amzn-s3-demo-bucket1* with the name of your bucket.

For more information, see [ Using Bucket Policies and User Policies](https://docs.amazonaws.cn/AmazonS3/latest/userguide/using-iam-policies.html) in the *Amazon Simple Storage Service User Guide*.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
  {
    "Effect": "Allow",
    "Principal": {
      "Service": "billingreports.amazonaws.com"
    },
    "Action": [
      "s3:GetBucketAcl",
      "s3:GetBucketPolicy"
    ],
    "Resource": "arn:aws-cn:s3:::amzn-s3-demo-bucket1"
  },
  {
    "Effect": "Allow",
    "Principal": {
      "Service": "billingreports.amazonaws.com"
    },
    "Action": "s3:PutObject",
    "Resource": "arn:aws-cn:s3:::amzn-s3-demo-bucket1/*"
  }
  ]
}
```

------

## Find products and prices
<a name="example-policy-pe-api"></a>

To allow an IAM user to use the Amazon Price List Service API, use the following policy to grant them access.

This policy grants permission to use both the Amazon Price List Bulk API Amazon Price List Query API.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "pricing:DescribeServices",
                "pricing:GetAttributeValues",
                "pricing:GetProducts",
                "pricing:GetPriceListFileUrl",
                "pricing:ListPriceLists"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}
```

------

## View costs and usage
<a name="example-policy-ce-api"></a>

To allow IAM users to use the Amazon Cost Explorer API, use the following policy to grant them access.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "ce:*"
      ],
      "Resource": [
        "*"
      ]
    }
  ]
}
```

------

## Enable and disable Amazon Regions
<a name="enable-disable-regions"></a>

For an example IAM policy that allows users to enable and disable Regions, see [Amazon: Allows Enabling and Disabling Amazon Regions](https://docs.amazonaws.cn/IAM/latest/UserGuide/reference_policies_examples_aws-enable-disable-regions.html) in the *IAM User Guide*. 

## View and manage cost categories
<a name="example-policy-cc-api"></a>

To allow IAM users to use, view, and manage cost categories, use the following policy to grant them access.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "aws-portal:ViewBilling",
        "ce:GetCostAndUsage",
        "ce:DescribeCostCategoryDefinition",
        "ce:UpdateCostCategoryDefinition",
        "ce:CreateCostCategoryDefinition",
        "ce:DeleteCostCategoryDefinition",
        "ce:ListCostCategoryDefinitions",
        "ce:TagResource",
        "ce:UntagResource",
        "ce:ListTagsForResource",
        "pricing:DescribeServices"
      ],
      "Resource": "*"
    }
  ]
}
```

------

## Create, view, edit, or delete Amazon Cost and Usage Reports
<a name="example-policy-report-definition"></a>

This policy allows an IAM user to create, view, edit, or delete `sample-report` using the API.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "ManageSampleReport",
            "Effect": "Allow",
			"Action": [
                "cur:PutReportDefinition", 
                "cur:DeleteReportDefinition",
                "cur:ModifyReportDefinition"
            ],
            "Resource": "arn:aws-cn:cur:*:123456789012:definition/sample-report"
        },
        {
            "Sid": "DescribeReportDefs",
            "Effect": "Allow",
            "Action": "cur:DescribeReportDefinitions",
            "Resource": "*"
        }
    ]
}
```

------

## View and manage purchase orders
<a name="example-view-manage-purchaseorders"></a>

This policy allows an IAM user to view and manage purchase orders, using the following policy to grant access.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling",
                "purchase-orders:*"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## View and update the Cost Explorer preferences page
<a name="example-view-update-ce"></a>

This policy allows an IAM user to view and update using the **Cost Explorer preferences page**.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "aws-portal:ViewBilling",
        "ce:UpdatePreferences"
       ],
      "Resource": "*"
    }
  ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but deny permission to view or edit the **Preferences** page.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:GetPreferences",
                "ce:UpdatePreferences"
            ],
            "Resource": "*"
        }
    ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but deny permission to edit the **Preferences** page.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:UpdatePreferences"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## View, create, update, and delete using the Cost Explorer reports page
<a name="example-view-ce-reports"></a>

This policy allows an IAM user to view, create, update, and delete using the **Cost Explorer reports page**.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "aws-portal:ViewBilling",
        "ce:CreateReport",
        "ce:UpdateReport",
        "ce:DeleteReport"
       ],
      "Resource": "*"
    }
  ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but deny permission to view or edit the **Reports** page.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:DescribeReport",
                "ce:CreateReport",
                "ce:UpdateReport",
                "ce:DeleteReport"
            ],
            "Resource": "*"
        }
    ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but deny permission to edit the **Reports** page.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:CreateReport",
                "ce:UpdateReport",
                "ce:DeleteReport"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## View, create, update, and delete reservation and Savings Plans alerts
<a name="example-view-ce-expiration"></a>

This policy allows an IAM user to view, create, update, and delete [reservation expiration alerts](https://docs.amazonaws.cn/awsaccountbilling/latest/aboutv2/ce-ris.html) and [Savings Plans alerts](https://docs.amazonaws.cn/savingsplans/latest/userguide/sp-overview.html#sp-alert). To edit reservation expiration alerts or Savings Plans alerts, a user needs all three granular actions: `ce:CreateNotificationSubscription`, `ce:UpdateNotificationSubscription`, and `ce:DeleteNotificationSubscription`.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Sid": "VisualEditor0",
      "Effect": "Allow",
      "Action": [
        "aws-portal:ViewBilling",
        "ce:CreateNotificationSubscription",
        "ce:UpdateNotificationSubscription",
        "ce:DeleteNotificationSubscription"
       ],
      "Resource": "*"
    }
  ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but denies permission to view or edit the **Reservation Expiration Alerts** and **Savings Plans alert** pages.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:DescribeNotificationSubscription",
                "ce:CreateNotificationSubscription",
                "ce:UpdateNotificationSubscription",
                "ce:DeleteNotificationSubscription"
            ],
            "Resource": "*"
        }
    ]
}
```

------

The following policy allows IAM users to view Cost Explorer, but denies permission to edit the **Reservation Expiration Alerts** and **Savings Plans alert** pages.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "aws-portal:ViewBilling"
            ],
            "Resource": "*"
        },
        {
            "Sid": "VisualEditor1",
            "Effect": "Deny",
            "Action": [
                "ce:CreateNotificationSubscription",
                "ce:UpdateNotificationSubscription",
                "ce:DeleteNotificationSubscription"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## Allow read-only access to Amazon Cost Anomaly Detection
<a name="example-policy-ce-ad"></a>

To allow IAM users read-only access to Amazon Cost Anomaly Detection, use the following policy to grant them access. `ce:ProvideAnomalyFeedback` is optional as a part of the read-only access.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Action": [
        "ce:Get*"
      ],
      "Effect": "Allow",
      "Resource": "*"
    }
  ]
}
```

------

## Allow Amazon Budgets to apply IAM policies and SCPs
<a name="example-budgets-IAM-SCP"></a>

This policy allows Amazon Budgets to apply IAM policies and service control policies (SCPs) on behalf of the user.

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "iam:AttachGroupPolicy",
        "iam:AttachRolePolicy",
        "iam:AttachUserPolicy",
        "iam:DetachGroupPolicy",
        "iam:DetachRolePolicy",
        "iam:DetachUserPolicy",
        "organizations:AttachPolicy",
        "organizations:DetachPolicy"
      ],
      "Resource": "*"
    }
  ]
}
```

------

## Allow Amazon Budgets to apply IAM policies and SCPs and target EC2 and RDS instances
<a name="example-budgets-applySCP"></a>

This policy allows Amazon Budgets to apply IAM policies and service control policies (SCPs), and to target Amazon EC2 and Amazon RDS instances on behalf of the user.

Trust policy

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "Service": "budgets.amazonaws.com"
      },
      "Action": "sts:AssumeRole"
    }
  ]
}
```

------

Permissions policy

------
#### [ JSON ]

****  

```
{
  "Version":"2012-10-17",		 	 	 
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "ec2:DescribeInstanceStatus",
        "ec2:StartInstances",
        "ec2:StopInstances",
        "iam:AttachGroupPolicy",
        "iam:AttachRolePolicy",
        "iam:AttachUserPolicy",
        "iam:DetachGroupPolicy",
        "iam:DetachRolePolicy",
        "iam:DetachUserPolicy",
        "organizations:AttachPolicy",
        "organizations:DetachPolicy",
        "rds:DescribeDBInstances",
        "rds:StartDBInstance",
        "rds:StopDBInstance",
        "ssm:StartAutomationExecution"
      ],
      "Resource": "*"
    }
  ]
}
```

------

## Allow IAM users to view, create, and update your Fapiao settings information
<a name="example-budgets-fapiao"></a>

This policy allows an IAM user to view, create, and update your Fapiao settings information without giving the IAM user access to sensitive account information.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions)

------
#### [ JSON ]

****  

```
{
"Version":"2012-10-17",		 	 	 
    "Statement": [
        {"Effect": "Allow",
            "Action": [
                "fapiao:GetAccountFapiaoSetting",
                "fapiao:UpdateAccountFapiaoInformation",
                "fapiao:UpdateAccountMailingAddress",
                "fapiao:CreateAccountFapiaoSetting"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## Allow IAM users to view US tax exemptions and create Amazon Web Services Support cases
<a name="example-awstaxexemption"></a>

This policy allows an IAM user to view US tax exemptions and create Amazon Web Services Support cases to upload exemption certificates in the tax exemption console.

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Action": [
                "aws-portal:*",
                "tax:GetExemptions",
                "tax:UpdateExemptions",
                "support:CreateCase",
                "support:AddAttachmentsToSet"
            ],
            "Resource": [
                "*"
            ],
            "Effect": "Allow"
        }
    ]
}
```

------

## Allow IAM users to view and update your real name information
<a name="example-budgets-realname"></a>

This policy allows an IAM user to view and update the account's real name information.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions).

------
#### [ JSON ]

****  

```
{
"Version":"2012-10-17",		 	 	 
    "Statement": [
        {"Effect": "Allow",
            "Action": [
                "cloudassist:DescribeAccountRealNameInformation",
                "cloudassist:UpdateAccountRealNameInformation"
            ],
            "Resource": "*"
        }
    ]
}
```

------

## (For customers with a billing or contact address in India) Allow read-only access to customer verification information
<a name="example-aispl-verification"></a>

This policy allows IAM users read-only access to customer verification information.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions).

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [{
        "Effect": "Allow",
        "Action": [
            "customer-verification:GetCustomerVerificationEligibility",
            "customer-verification:GetCustomerVerificationDetails"
        ],
        "Resource": "*"
    }]
}
```

------

## (For customers with a billing or contact address in India) View, create, and update customer verification information
<a name="example-aispl-verification-view"></a>

This policy allows IAM users to manage their customer verification information. 

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions)

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [{
        "Effect": "Allow",
        "Action": [
            "customer-verification:CreateCustomerVerificationDetails",
            "customer-verification:UpdateCustomerVerificationDetails",
            "customer-verification:GetCustomerVerificationEligibility",
            "customer-verification:GetCustomerVerificationDetails"
        ],
        "Resource": "*"
    }]
}
```

------

## View Amazon Migration Acceleration Program information in the Billing console
<a name="read-only-migration-acceleration-program-policy"></a>

This policy allows IAM users to view the Migration Acceleration Program agreements, credits, and eligible spend for the payer's account in the Billing console.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions).

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [{
        "Effect": "Allow",
        "Action": [
            "mapcredits:ListQuarterSpend",
            "mapcredits:ListQuarterCredits",
            "mapcredits:ListAssociatedPrograms"
        ],
        "Resource": "*"
    }]
}
```

------

## Allow access to Amazon invoice configuration in the Billing console
<a name="invoice-config-policy"></a>

This policy allows IAM users Amazon invoice configuration access in the Billing console.

For definitions of each action, see [Amazon Billing console actions](security_iam_id-based-policy-examples.md#user-permissions).

------
#### [ JSON ]

****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "invoicing:ListInvoiceUnits",
                "invoicing:GetInvoiceUnit",
                "invoicing:CreateInvoiceUnit",
                "invoicing:UpdateInvoiceUnit",
                "invoicing:DeleteInvoiceUnit",
                "invoicing:BatchGetInvoiceProfile"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}
```

------