Managing access to data sources - Amazon CloudWatch

Managing access to data sources

CloudWatch uses AWS CloudFormation to create the required resources in your account. We recommend that you use the cloudformation:TemplateUrl condition to control access to AWS CloudFormation templates when you grant CreateStack permissions to IAM users.


Any user that you grant data source invoke permission to can query metrics from that data source even if that user does not have direct IAM permissions to the data source. For example, if you grant lambda:InvokeFunction permissions on a Amazon Managed Service for Prometheus data source Lambda function to a user, that user will be able to query metrics from the corresponding Amazon Managed Service for Prometheus workspace even if you didn't grant them direct IAM access to that workspace.

You can find template URLs for data sources on the Create stack page in the CloudWatch Settings Console.

{ "Version":"2012-10-17", "Statement":[ { "Effect" : "Allow", "Action" : [ "cloudformation:CreateStack" ], "Resource" : "*", "Condition" : { "StringEquals" : { "cloudformation:TemplateUrl" : [ data-source-template-url ] } } } ] }

For more information about controlling AWS CloudFormation access, see Controlling access with AWS Identity and Access Management