Amazon managed policies for Amazon Database Migration Service - Amazon Database Migration Service
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Amazon managed policies for Amazon Database Migration Service

Amazon managed policy: AmazonDMSVPCManagementRole

This policy is attached to the dms-vpc-role role, which allows Amazon DMS to perform actions on your behalf.

This policy grants contributor permissions that allow Amazon DMS to manage network resources.

Permissions details

This policy includes the following operations:

  • ec2:CreateNetworkInterface – Amazon DMS needs this permission to create network interfaces. These interfaces are essential for the Amazon DMS replication instance to connect to the source and target databases.

  • ec2:DeleteNetworkInterface – Amazon DMS needs this permission to clean up network interfaces that it created once they are no longer needed. This helps in resource management and avoiding unnecessary costs.

  • ec2:DescribeAvailabilityZones – This permission allows Amazon DMS to retrieve information about the availability zones in a region. Amazon DMS uses this information to ensure that it provisions resources in the correct zones for redundancy and availability.

  • ec2:DescribeDhcpOptions – Amazon DMS retrieves the DHCP options set details for the specified VPC. This information is required to configure the networking correctly for the replication instances.

  • ec2:DescribeInternetGateways – Amazon DMS may require this permission to understand the internet gateways configured in the VPC. This information is crucial if the replication instance or databases need internet access.

  • ec2:DescribeNetworkInterfaces – Amazon DMS retrieves information about existing network interfaces within the VPC. This information is necessary for Amazon DMS to configure the network interfaces correctly and ensure proper network connectivity for the migration process.

  • ec2:DescribeSecurityGroups – Security groups control the inbound and outbound traffic to instances and resources. Amazon DMS needs to describe security groups to correctly configure network interfaces and ensure proper communication between the replication instance and the databases.

  • ec2:DescribeSubnets – This permission allows Amazon DMS to list the subnets in a VPC. Amazon DMS uses this information to launch replication instances in the appropriate subnets, ensuring they have the necessary network connectivity.

  • ec2:DescribeVpcs – Describing VPCs is essential for Amazon DMS to understand the network environment where the replication instance and databases reside. This includes knowing the CIDR blocks and other VPC-specific configurations.

  • ec2:ModifyNetworkInterfaceAttribute – This permission is required for Amazon DMS to modify attributes of the network interfaces it manages. This could include adjusting settings to ensure connectivity and security.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "Statement1", "Effect": "Allow", "Action": [ "ec2:CreateNetworkInterface", "ec2:DeleteNetworkInterface", "ec2:DescribeAvailabilityZones", "ec2:DescribeDhcpOptions", "ec2:DescribeInternetGateways", "ec2:DescribeNetworkInterfaces", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcs", "ec2:ModifyNetworkInterfaceAttribute" ], "Resource": "*" } ] }

Amazon managed policy: AWSDMSServerlessServiceRolePolicy

This policy is attached to the AWSServiceRoleForDMSServerless role, which allows Amazon DMS to perform actions on your behalf. For more information, see Service-linked role for Amazon DMS Serverless.

This policy grants contributor permissions that allow Amazon DMS to manage replication resources.

Permissions details

This policy includes the following permissions.

  • Amazon DMS – Allows principals to interact with Amazon DMS resources.

  • Amazon S3 – Allows S3 to create an S3 bucket to store a serverless premigration assessment. The serverless premigration assessment result will be stored with a dms-severless-premigration-assessment-<UUID> prefix. The S3 bucket is created for one user per Region and its bucket policy limits access to only the service's service role.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "id0", "Effect": "Allow", "Action": [ "dms:CreateReplicationInstance", "dms:CreateReplicationTask" ], "Resource": "*", "Condition": { "StringEquals": { "dms:req-tag/ResourceCreatedBy": "DMSServerless" } } }, { "Sid": "id1", "Effect": "Allow", "Action": [ "dms:DescribeReplicationInstances", "dms:DescribeReplicationTasks" ], "Resource": "*" }, { "Sid": "id2", "Effect": "Allow", "Action": [ "dms:StartReplicationTask", "dms:StopReplicationTask", "dms:ModifyReplicationTask", "dms:DeleteReplicationTask", "dms:ModifyReplicationInstance", "dms:DeleteReplicationInstance" ], "Resource": [ "arn:aws:dms:*:*:rep:*", "arn:aws:dms:*:*:task:*" ], "Condition": { "StringEqualsIgnoreCase": { "aws:ResourceTag/ResourceCreatedBy": "DMSServerless" } } }, { "Sid": "id3", "Effect": "Allow", "Action": [ "dms:TestConnection", "dms:DeleteConnection" ], "Resource": [ "arn:aws:dms:*:*:rep:*", "arn:aws:dms:*:*:endpoint:*" ] }, { "Sid": "id4", "Effect": "Allow", "Action": [ "s3:PutObject", "s3:DeleteObject", "s3:GetObject", "s3:PutObjectTagging" ], "Resource": [ "arn:aws:s3:::dms-serverless-premigration-results-*" ], "Condition": { "StringEquals": { "s3:ResourceAccount": "${aws:PrincipalAccount}" } } }, { "Sid": "id5", "Effect": "Allow", "Action": [ "s3:PutBucketPolicy", "s3:ListBucket", "s3:GetBucketLocation", "s3:CreateBucket" ], "Resource": [ "arn:aws:s3:::dms-serverless-premigration-results-*" ], "Condition": { "StringEquals": { "s3:ResourceAccount": "${aws:PrincipalAccount}" } } }, { "Sid": "id6", "Effect": "Allow", "Action": [ "dms:StartReplicationTaskAssessmentRun" ], "Resource": [ "*" ], "Condition": { "StringEqualsIgnoreCase": { "aws:ResourceTag/ResourceCreatedBy": "DMSServerless" } } } ] }

Amazon managed policy: AmazonDMSCloudWatchLogsRole

This policy is attached to the dms-cloudwatch-logs-role role, which allows Amazon DMS to perform actions on your behalf. For more information, see Using service-linked roles for Amazon DMS.

This policy grants contributor permissions that allow Amazon DMS to publish replication logs to CloudWatch logs.

Permissions details

This policy includes the following permissions.

  • logs – Allows principals to publish logs to CloudWatch Logs. This permission is required so that Amazon DMS can use CloudWatch to display replication logs.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowDescribeOnAllLogGroups", "Effect": "Allow", "Action": [ "logs:DescribeLogGroups" ], "Resource": [ "*" ] }, { "Sid": "AllowDescribeOfAllLogStreamsOnDmsTasksLogGroup", "Effect": "Allow", "Action": [ "logs:DescribeLogStreams" ], "Resource": [ "arn:aws:logs:*:*:log-group:dms-tasks-*", "arn:aws:logs:*:*:log-group:dms-serverless-replication-*" ] }, { "Sid": "AllowCreationOfDmsLogGroups", "Effect": "Allow", "Action": [ "logs:CreateLogGroup" ], "Resource": [ "arn:aws:logs:*:*:log-group:dms-tasks-*", "arn:aws:logs:*:*:log-group:dms-serverless-replication-*:log-stream:" ] }, { "Sid": "AllowCreationOfDmsLogStream", "Effect": "Allow", "Action": [ "logs:CreateLogStream" ], "Resource": [ "arn:aws:logs:*:*:log-group:dms-tasks-*:log-stream:dms-task-*", "arn:aws:logs:*:*:log-group:dms-serverless-replication-*:log-stream:dms-serverless-*" ] }, { "Sid": "AllowUploadOfLogEventsToDmsLogStream", "Effect": "Allow", "Action": [ "logs:PutLogEvents" ], "Resource": [ "arn:aws:logs:*:*:log-group:dms-tasks-*:log-stream:dms-task-*", "arn:aws:logs:*:*:log-group:dms-serverless-replication-*:log-stream:dms-serverless-*" ] } ] }

Amazon managed policy: AWSDMSFleetAdvisorServiceRolePolicy

You can't attach AWSDMSFleetAdvisorServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role that allows Amazon DMS Fleet Advisor to perform actions on your behalf. For more information, see Using service-linked roles for Amazon DMS.

This policy grants contributor permissions that allow Amazon DMS Fleet Advisor to publish Amazon CloudWatch metrics.

Permissions details

This policy includes the following permissions.

  • cloudwatch – Allows principals to publish metric data points to Amazon CloudWatch. This permission is required so that Amazon DMS Fleet Advisor can use CloudWatch to display charts with database metrics.

{ "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Resource": "*", "Action": "cloudwatch:PutMetricData", "Condition": { "StringEquals": { "cloudwatch:namespace": "AWS/DMS/FleetAdvisor" } } } }

Amazon managed policy: AmazonDMSRedshiftS3Role

This policy provides permissions that allow Amazon DMS to manage S3 settings for Redshift endpoints.

Permissions details

This policy includes the following operations:

  • s3:CreateBucket - Allows DMS to create S3 buckets with the "dms-" prefix

  • s3:ListBucket - Allows DMS to list the contents of S3 buckets with the "dms-" prefix

  • s3:DeleteBucket - Allows DMS to delete S3 buckets with the "dms-" prefix

  • s3:GetBucketLocation - Allows DMS to retrieve the Region where an S3 bucket is located

  • s3:GetObject - Allows DMS to retrieve objects from S3 buckets with the "dms-" prefix

  • s3:PutObject - Allows DMS to add objects to S3 buckets with the "dms-" prefix

  • s3:DeleteObject - Allows DMS to delete objects from S3 buckets with the "dms-" prefix

  • s3:GetObjectVersion - Allows DMS to retrieve specific versions of objects in versioned buckets

  • s3:GetBucketPolicy - Allows DMS to retrieve bucket policies

  • s3:PutBucketPolicy - Allows DMS to create or update bucket policies

  • s3:GetBucketAcl - Allows DMS to retrieve bucket access control lists (ACLs)

  • s3:PutBucketVersioning - Allows DMS to enable or suspend versioning on buckets

  • s3:GetBucketVersioning - Allows DMS to retrieve the versioning status of buckets

  • s3:PutLifecycleConfiguration - Allows DMS to create or update lifecycle rules for buckets

  • s3:GetLifecycleConfiguration - Allows DMS to retrieve lifecycle rules configured for buckets

  • s3:DeleteBucketPolicy - Allows DMS to delete bucket policies

All these permissions apply only to resources with ARN pattern: arn:aws:s3:::dms-*

JSON policy document

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "s3:CreateBucket", "s3:ListBucket", "s3:DeleteBucket", "s3:GetBucketLocation", "s3:GetObject", "s3:PutObject", "s3:DeleteObject", "s3:GetObjectVersion", "s3:GetBucketPolicy", "s3:PutBucketPolicy", "s3:GetBucketAcl", "s3:PutBucketVersioning", "s3:GetBucketVersioning", "s3:PutLifecycleConfiguration", "s3:GetLifecycleConfiguration", "s3:DeleteBucketPolicy" ], "Resource": "arn:aws:s3:::dms-*" } ] }

Amazon DMS updates to Amazon managed policies

View details about updates to Amazon managed policies for Amazon DMS since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Amazon DMS Document history page.

Change Description Date

Service-linked role for Amazon DMS Serverless – Change

Amazon DMS updated AWSDMSServerlessServiceRolePolicy to allow dms:StartReplicationTaskAssessmentRun to support running premigration assessments. Amazon DMS also updated the serverless service-linked role to create S3 buckets and put the premigration assessment results into those buckets.

February 14, 2025

AWSDMSServerlessServiceRolePolicy – Change

Amazon DMS added dms:ModifyReplicationTask which is required by Amazon DMS Serverless to call the ModifyReplicationTask operation to modify a replication task. Amazon DMS added dms:ModifyReplicationInstance which is required by Amazon DMS Serverless to call ModifyReplicationInstance operation to modify a replication instance.

January 17, 2025

AmazonDMSVPCManagementRole – Change

Amazon DMS added ec2:DescribeDhcpOptions and ec2:DescribeNetworkInterfaces operations to allow Amazon DMS to manage network settings on your behalf.

June 17, 2024

AWSDMSServerlessServiceRolePolicy – New policy

Amazon DMS added the AWSDMSServerlessServiceRolePolicy role to allow Amazon DMS to create and manage services on your behalf, such as publishing Amazon CloudWatch metrics.

May 22, 2023

AmazonDMSCloudWatchLogsRole – Change

Amazon DMS added the ARN for serverless resources to each of the permissions granted, to allow uploading Amazon DMS replication logs from serverless replication configurations to CloudWatch Logs.

May 22, 2023

AWSDMSFleetAdvisorServiceRolePolicy – New policy

Amazon DMS Fleet Advisor added a new policy to allow publishing metric data points to Amazon CloudWatch.

March 6, 2023

Amazon DMS started tracking changes

Amazon DMS started tracking changes for its Amazon managed policies.

March 6, 2023