AWS Identity and Access Management
User Guide

The AWS Documentation website is getting a new look!
Try it now and let us know what you think. Switch to the new look >>

You can return to the original look by selecting English in the language selector above.

Actions, Resources, and Condition Keys for Amazon Macie

Amazon Macie (service prefix: macie) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.


Actions Defined by Amazon Macie

You can specify the following actions in the Action element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.

The Resource column indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("*") in the Resource element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. Required resources are indicated in the table with an asterisk (*). If you specify a resource-level permission ARN in a statement using this action, then it must be of this type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one but not the other.

For details about the columns in the following table, see The Actions Table.

Actions Description Access Level Resource Types (*required) Condition Keys Dependent Actions
AssociateMemberAccount Enables the user to associate a specified AWS account with Amazon Macie as a member account. Write
AssociateS3Resources Enables the user to associate specified S3 resources with Amazon Macie for monitoring and data classification. Write


DisassociateMemberAccount Enables the user to remove the specified member account from Amazon Macie. Write
DisassociateS3Resources Enables the user to remove specified S3 resources from being monitored by Amazon Macie. Write


ListMemberAccounts Enables the user to list all Amazon Macie member accounts for the current Macie master account. List
ListS3Resources Enables the user to list all the S3 resources associated with Amazon Macie. List
UpdateS3Resources Enables the user to update the classification types for the specified S3 resources. Write


Resources Defined by Amazon Macie

Amazon Macie does not support specifying a resource ARN in the Resource element of an IAM policy statement. To allow access to Amazon Macie, specify “Resource”: “*” in your policy.

Condition Keys for Amazon Macie

Amazon Macie defines the following condition keys that can be used in the Condition element of an IAM policy. You can use these keys to further refine the conditions under which the policy statement applies. For details about the columns in the following table, see The Condition Keys Table.

To view the global condition keys that are available to all services, see Available Global Condition Keys in the IAM Policy Reference.

Condition Keys Description Type
aws:SourceArn Allow access to the specified actions only when the request operates on the specified aws resource Arn