Automatic plan execution reports permissions
The following is a sample policy to attach if you configure automatic report generation for a Region switch plan. This policy includes permissions to write reports to Amazon S3, access CloudWatch alarm data, and retrieve child plan information for parent plans.
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "s3:PutObject", "Resource": "arn:aws:s3:::your-bucket-name/*" }, { "Effect": "Allow", "Action": [ "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmHistory" ], "Resource": [ "arn:aws:cloudwatch:us-east-1:123456789012:alarm:app-health-primary" "arn:aws:cloudwatch:us-west-2:123456789012:alarm:app-health-secondary" ], }, { "Effect": "Allow", "Action": [ "arc-region-switch:GetPlanExecution", "arc-region-switch:ListPlanExecutionEvents" ], "Resource": [ "arn:aws:arc-region-switch:us-east-1:123456789012:plan/child-plan-1/abcde1", "arn:aws:arc-region-switch:us-west-2:123456789012:plan/child-plan-2/fghij2" ], } ] }
Note: If you configure a customer managed Amazon KMS key for Amazon S3 bucket encryption, you must also add
kms:GenerateDataKey and kms:Encrypt permissions for the key.