AWS Identity and Access Management
User Guide

Actions, Resources, and Condition Keys for Amazon Macie

Amazon Macie (service prefix: macie) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:

Actions Defined by Amazon Macie

You can specify the following actions in the Action element of an IAM policy statement. By using policies, you define the permissions for anyone performing an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions. For details about the columns in the following table, see The Actions Table.

Actions Description Access Level Resource Types (*required) Condition Keys Dependent Actions
AssociateMemberAccount Enables the user to associate a specified AWS account with Amazon Macie as a member account. Write
AssociateS3Resources Enables the user to associate specified S3 resources with Amazon Macie for monitoring and data classification. Write

aws:SourceArn

DisassociateMemberAccount Enables the user to remove the specified member account from Amazon Macie. Write
DisassociateS3Resources Enables the user to remove specified S3 resources from being monitored by Amazon Macie. Write

aws:SourceArn

ListMemberAccounts Enables the user to list all Amazon Macie member accounts for the current Macie master account. List
ListS3Resources Enables the user to list all the S3 resources associated with Amazon Macie. List
UpdateS3Resources Enables the user to update the classification types for the specified S3 resources. Write

aws:SourceArn

Resources Defined by Macie

Amazon Macie has no service-defined resources that can be used as the Resource element of an IAM policy statement.

Condition Keys for Amazon Macie

Amazon Macie defines the following condition keys that can be used in the Condition element of an IAM policy. You can use these keys to further refine the conditions under which the policy statement applies. For details about the columns in the following table, see The Condition Keys Table.

To view the global condition keys that are available to all services, see Available Global Condition Keys in the IAM Policy Reference.

Condition Keys Description Type
aws:SourceArn Allow access to the specified actions only when the request operates on the specified aws resource Arn