

# Amazon managed policies for Amazon Transfer Family
<a name="security-iam-awsmanpol"></a>

To add permissions to users, groups, and roles, it is easier to use Amazon managed policies than to write policies yourself. It takes time and expertise to [create Amazon Identity and Access Management (IAM) customer managed policies](https://docs.amazonaws.cn/IAM/latest/UserGuide/access_policies_create-console.html) that provide your team with only the permissions that they need. To get started quickly, you can use our Amazon managed policies. These policies cover common use cases and are available in your Amazon Web Services account. For more information about Amazon managed policies, see [Amazon managed policies](https://docs.amazonaws.cn/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#aws-managed-policies) in the *IAM User Guide*. For a detailed listing of all Amazon managed policies, see the [Amazon managed policy reference guide](https://docs.amazonaws.cn/aws-managed-policy/latest/reference/about-managed-policy-reference.html).

Amazon services maintain and update Amazon managed policies. You can't change the permissions in Amazon managed policies. Services occasionally add additional permissions to an Amazon managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an Amazon managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an Amazon managed policy, so policy updates won't break your existing permissions.

Additionally, Amazon supports managed policies for job functions that span multiple services. For example, the `ReadOnlyAccess` Amazon managed policy provides read-only access to all Amazon services and resources. When a service launches a new feature, Amazon adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see [Amazon managed policies for job functions](https://docs.amazonaws.cn/IAM/latest/UserGuide/access_policies_job-functions.html) in the *IAM User Guide*.

## Amazon managed policy: AWSTransferConsoleFullAccess
<a name="security-iam-awsmanpol-transferconsolefullaccess"></a>

The `AWSTransferConsoleFullAccess` policy provides full access to Transfer Family through the Amazon Management Console. For more information, see [Service-linked role for Amazon Transfer Family](https://docs.amazonaws.cn/aws-managed-policy/latest/reference/AWSTransferConsoleFullAccess.html).

## Amazon managed policy: AWSTransferFullAccess
<a name="security-iam-awsmanpol-transferfullaccess"></a>

 The `AWSTransferFullAccess` policy provides full access to Transfer Family services. For more information, see [Service-linked role for Amazon Transfer Family](https://docs.amazonaws.cn/aws-managed-policy/latest/reference/AWSTransferFullAccess.html).

## Amazon managed policy: AWSTransferLoggingAccessV3
<a name="security-iam-awsmanpol-transferloggingaccessv3"></a>

 The `AWSTransferLoggingAccessV3` policy grants administrative permissions that allow logging of your Amazon Transfer Family server activity to Amazon CloudWatch Logs. Therefore, you should attach this policy to a logging role. 

**Permissions details**

This policy includes the following permissions for Amazon CloudWatch Logs.
+ `CreateLogStream` – Grants permissions for principals to create a log stream.
+ `DescribeLogStreams` – Grants permissions for principals to list the log streams for the log group.
+ `CreateLogGroup` – Grants permissions for principals to create log groups.
+ `PutLogEvents` – Grants permissions for principals to upload a batch of log events to a log stream.



****  

```
{
    "Version":"2012-10-17",		 	 	 
    "Statement": [
        {
            "Sid": "VisualEditor0",
            "Effect": "Allow",
            "Action": [
                "logs:CreateLogStream",
                "logs:DescribeLogStreams",
                "logs:CreateLogGroup",
                "logs:PutLogEvents"
            ],
            "Resource": "arn:aws-cn:logs:*:*:log-group:/aws/transfer/*"
        }
    ]
}
```

## Amazon managed policy: AWSTransferReadOnlyAccess
<a name="security-iam-awsmanpol-transferreadonlyaccess"></a>

 The `AWSTransferReadOnlyAccess` policy provides read-only access to Transfer Family services. For more information, see [Service-linked role for Amazon Transfer Family](https://docs.amazonaws.cn/aws-managed-policy/latest/reference/AWSTransferReadOnlyAccess.html).

## Amazon Transfer Family updates to Amazon managed policies
<a name="security-iam-awsmanpol-updates"></a>

View details about updates to Amazon managed policies for Amazon Transfer Family since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the [Document history for Amazon Transfer Family](doc-history.md) page.




| Change | Description | Date | 
| --- | --- | --- | 
|   Documentation update   |  Added sections for each of the Transfer Family managed policies.  |  January 27, 2022  | 
|   [AWSTransferReadOnlyAccess](#security-iam-awsmanpol-transferreadonlyaccess) – Update to an existing policy   |  Amazon Transfer Family added new permissions to allow the policy to read Amazon Managed Microsoft AD.  |  September 30, 2021  | 
|  [AWSTransferLoggingAccessV3](#security-iam-awsmanpol-transferloggingaccessv3) – Update to an existing policy  |  `AWSTransferLoggingAccessV3` differs from `AWSTransferLoggingAccessV2` in that it is marked as a service role policy. This marking indicates that it is intended to give permissions to the Amazon Transfer Family service. There is no functional change.  | June 15, 2021 | 
|   `AWSTransferLoggingAccessV2` — Deprecated   |   This policy has been replaced by `AWSTransferLoggingAccessV3`.   |  June 15, 2021  | 
|  Amazon Transfer Family started tracking changes  |  Amazon Transfer Family started tracking changes for its Amazon managed policies.  | June 15, 2021 | 