Amazon managed policies for Amazon DataSync
To add permissions to users, groups, and roles, it's easier to use Amazon managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our Amazon managed policies. These policies cover common use cases and are available in your Amazon Web Services account. For more information about Amazon managed policies, see Amazon managed policies in the IAM User Guide.
Amazon Web Services services maintain and update Amazon managed policies. You can't change the permissions in Amazon managed policies. Services occasionally add additional permissions to an Amazon managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an Amazon managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an Amazon managed policy, so policy updates won't break your existing permissions.
Additionally, Amazon supports managed policies for job functions that span multiple
services. For example, the ReadOnlyAccess
Amazon managed policy provides read-only
access to all Amazon Web Services services and resources. When a service launches a new feature, Amazon adds
read-only permissions for new operations and resources. For a list and descriptions of job
function policies, see Amazon managed policies for
job functions in the IAM User Guide.
Amazon managed policy: AWSDataSyncReadOnlyAccess
You can attach the AWSDataSyncReadOnlyAccess
policy to your IAM identities.
This policy grants read-only permissions for DataSync.
{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncReadOnlyAccessPermissions", "Effect": "Allow", "Action": [ "datasync:Describe*", "datasync:List*", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "fsx:DescribeFileSystems", "iam:GetRole", "iam:ListRoles", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "s3:ListAllMyBuckets", "s3:ListBucket" ], "Resource": "*" }] }
Amazon managed policy: AWSDataSyncFullAccess
You can attach the AWSDataSyncFullAccess
policy to your IAM identities.
This policy grants administrative permissions for DataSync and is required for
Amazon Web Services Management Console access to the service. AWSDataSyncFullAccess
provides full
access to DataSync API operations and the operations that describe related resources (such as
Amazon S3 buckets and Amazon EFS file systems). The policy also grants permissions for Amazon CloudWatch,
including creating log groups and creating or updating a resource policy.
{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncFullAccessPermissions", "Effect": "Allow", "Action": [ "datasync:*", "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission", "ec2:DeleteNetworkInterface", "ec2:DescribeNetworkInterfaces", "ec2:DescribeRegions", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcEndpoints", "ec2:ModifyNetworkInterfaceAttribute", "fsx:DescribeFileSystems", "fsx:DescribeStorageVirtualMachines", "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "iam:GetRole", "iam:ListRoles", "logs:CreateLogGroup", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "outposts:ListOutposts", "s3:GetBucketLocation", "s3:ListAllMyBuckets", "s3:ListBucket", "s3:ListBucketVersions", "s3-outposts:ListAccessPoints", "s3-outposts:ListRegionalBuckets" ], "Resource": "*" }, { "Sid": "DataSyncPassRolePermissions", "Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "*", "Condition": { "StringEquals": { "iam:PassedToService": [ "datasync.amazonaws.com" ] } } }, { "Sid": "DataSyncCreateSLRPermissions", "Effect": "Allow", "Action": [ "iam:CreateServiceLinkedRole" ], "Resource": "arn:aws-cn:iam::*:role/aws-service-role/datasync.amazonaws.com/AWSServiceRoleForDataSync", "Condition": { "StringEquals": { "iam:AWSServiceName": "datasync.amazonaws.com" } } } ] }
Amazon managed policy: AWSDataSyncDiscoveryServiceRolePolicy
You can't attach the AWSDataSyncDiscoveryServiceRolePolicy
policy to your
IAM identities. This policy is attached to a service-linked role that allows DataSync to
perform actions on your behalf. For more information, see Using service-linked roles for
DataSync.
Amazon managed policy: AWSDataSyncServiceRolePolicy
You can't attach the AWSDataSyncServiceRolePolicy
policy to your IAM
identities. This policy is attached to a service-linked role that allows DataSync to perform
actions on your behalf. For more information, see Using service-linked roles for
DataSync.
This policy grants administrative permissions that allow the service-linked role to create Amazon CloudWatch logs for DataSync tasks using Enhanced mode.
Policy updates
Change | Description | Date |
---|---|---|
AWSDataSyncServiceRolePolicy – New policy |
DataSync added a policy that's used by the DataSync service-linked role
|
October 30, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets DataSync create service-linked roles for you. |
October 30, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets you choose opt-in Regions when creating a DataSync task for transfers between Amazon Web Services Regions. |
July 22, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets you choose a specific version of your DataSync manifest. |
February 16, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new permissions to
These permissions help you create DataSync agents and locations for Amazon EFS, Amazon FSx for NetApp ONTAP, Amazon S3, and S3 on Outposts. |
May 2, 2023 |
DataSync started tracking changes |
DataSync started tracking changes for its Amazon managed policies. |
March 1, 2021 |