AWS managed policies for AWS Amplify - AWS Amplify Hosting

AWS managed policies for AWS Amplify

An AWS managed policy is a standalone policy that is created and administered by AWS. AWS managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.

Keep in mind that AWS managed policies might not grant least-privilege permissions for your specific use cases because they're available for all AWS customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.

You cannot change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. AWS is most likely to update an AWS managed policy when a new AWS service is launched or new API operations become available for existing services.

For more information, see AWS managed policies in the IAM User Guide.

AWS managed policy: AdministratorAccess-Amplify

You can attach the AdministratorAccess-Amplify policy to your IAM identities. Amplify also attaches this policy to a service role that allows Amplify to perform actions on your behalf.

When you deploy a backend in the Amplify console, you must create an Amplify-Backend Deployment service role that Amplify uses to create and manage AWS resources. IAM attaches the AdministratorAccess-Amplify managed policy to the Amplify-Backend Deployment service role.

This policy grants account administrative permissions while explicitly allowing direct access to resources that Amplify applications require to create and manage backends.

Permissions details

This policy provides access to multiple AWS services, including IAM actions. These actions allow identities with this policy to use AWS Identity and Access Management to create other identities with any permissions. This allows permissions escalation and this policy should be considered as powerful as the AdministratorAccess policy.

This policy grants the iam:PassRole action permission for all resources. This is required to support Amazon Cognito user pools configuration.

To view the permissions for this policy, see AdministratorAccess-Amplify in the AWS Managed Policy Reference.

AWS managed policy: AmplifyBackendDeployFullAccess

You can attach the AmplifyBackendDeployFullAccess policy to your IAM identities.

This policy grants Amplify full access permissions to deploy Amplify backend resources using the AWS Cloud Development Kit (AWS CDK). Permissions are deferred to the AWS CDK roles that have the necessary AdministratorAccess policy permissions.

Permissions details

This policy includes permissions to do the following .

  • Amplify– Retrieve metadata about deployed applications.

  • AWS CloudFormation– Create, update, and delete Amplify managed stacks.

  • SSM– Create, update, and delete Amplify managed SSM Parameter Store String and SecureString parameters.

  • AWS AppSync– Update and retrieve AWS AppSync schema, resolver and function resources. The purpose is to support the Gen 2 sandbox hotswapping functionality.

  • Lambda– Update and retrieve the configuration for Amplify managed functions. The purpose is to support the Gen 2 sandbox hotswapping functionality.

  • Amazon S3– Retrieve Amplify deployment assets.

  • AWS Security Token Service– Enables the AWS Cloud Development Kit (AWS CDK) CLI to assume the deployment role.

  • Amazon RDS– Read metadata of DB instances, clusters, and proxies.

  • Amazon EC2– Read the availability zone information for a subnet.

To view the permissions for this policy, see AmplifyBackendDeployFullAccess in the AWS Managed Policy Reference.

Amplify updates to AWS managed policies

View details about updates to AWS managed policies for Amplify since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Document history for AWS Amplify page.

Change Description Date

AmplifyBackendDeployFullAccess – Update to an existing policy

Adds a new AmplifyDiscoverRDSVpcConfig policy statement with Amazon RDS and Amazon EC2 read-only permissions scoped by both resource and account conditions. These permissions support the Amplify Gen 2 npx amplify generate schema-from-database command that allows customers to generate Typescript data schema from an existing SQL database.

Add the rds:DescribeDBProxies, rds:DescribeDBInstances, rds:DescribeDBClusters, rds:DescribeDBSubnetGroups, and ec2:DescribeSubnets permissions. The npx amplify generate schema-from-database command requires these permissions to check whether a specified DB host is hosted in Amazon RDS and auto-generate the Amazon VPC configuration required to provision the other resources required to set up an AWS AppSync API backed by a SQL database.

April 17, 2024

AmplifyBackendDeployFullAccess – Update to an existing policy

Add the cloudformation:DeleteStack policy action to support stack deletion when the DeleteBranch API is called.

Add the lambda:GetFunction policy action to support hotswapping functions.

Add the lambda:UpdateFunctionConfiguration policy action to support updates to the Lambda function.

April 5, 2024

AdministratorAccess-Amplify – Update to an existing policy

Add the cloudformation:TagResource and cloudformation:UnTagResource permissions to support calls to AWS CloudFormation APIs.

April 4, 2024

AmplifyBackendDeployFullAccess – Update to an existing policy

Add the lambda:InvokeFunction policy action to support AWS Cloud Development Kit (AWS CDK) hotswapping. The AWS CDK makes direct calls to a Lambda function to perform Amazon S3 asset hotswapping.

Add the lambda:UpdateFunctionCode policy action to support hotswapping functions.

January 02, 2024

AmplifyBackendDeployFullAccess – Update to an existing policy

Add policy actions to support the UpdateApiKey operation. This is required to enable a successful app deployment after exiting and restarting the sandbox without deleting resources.

November 17, 2023

AmplifyBackendDeployFullAccess – Update to an existing policy

Add the amplify:GetBackendEnvironment permission to support Amplify app deployment.

November 6, 2023

AmplifyBackendDeployFullAccess – New policy

Amplify added a new policy with the minimum permissions required to deploy Amplify backend resources.

October 8, 2023

AdministratorAccess-Amplify – Update to an existing policy

Add the ecr:DescribeRepositories permission that is required by the Amplify Command Line Interface (CLI). June 1, 2023

AdministratorAccess-Amplify – Update to an existing policy

Add a policy action to support removing tags from an AWS AppSync resource.

Add a policy action to support the Amazon Polly resource.

Add a policy action to support updating the OpenSearch domain configuration.

Add a policy action to support removing tags from an AWS Identity and Access Management role.

Add a policy action to support removing tags from an Amazon DynamoDB resource.

Add the cloudfront:GetCloudFrontOriginAccessIdentity and cloudfront:GetCloudFrontOriginAccessIdentityConfig permissions to the CLISDKCalls statement block to support the Amplify publish and hosting workflows.

Add the s3:PutBucketPublicAccessBlock permission to the CLIManageviaCFNPolicy statement block to allow the AWS CLI to support the Amazon S3 security best practice of enabling the Amazon S3 Block Public Access feature on internal buckets.

Add the cloudformation:DescribeStacks permission to the CLISDKCalls statement block to support retrieving customers’ AWS CloudFormation stacks on retries in the Amplify backend processor to avoid duplicating executions if a stack is updating.

Add the cloudformation:ListStacks permission to the CLICloudformationPolicy statement block. This permission is required to fully support the CloudFormation DescribeStacks action.

February 24, 2023

AdministratorAccess-Amplify – Update to an existing policy

Add policy actions to allow the Amplify server-side rendering feature to push application metrics to CloudWatch in a customer's AWS account.

August 30, 2022

AdministratorAccess-Amplify – Update to an existing policy

Add policy actions to block public access to the Amplify deployment Amazon S3 bucket.

April 27, 2022

AdministratorAccess-Amplify – Update to an existing policy

Add an action to allow customers to delete their server-side rendered (SSR) apps. This also allows the corresponding CloudFront distribution to be deleted successfully.

Add an action to allow customers to specify a different Lambda function to handle events from an existing event source using the Amplify CLI. With these changes, AWS Lambda will be able to perform the UpdateEventSourceMapping action.

April 17, 2022

AdministratorAccess-Amplify – Update to an existing policy

Add a policy action to enable Amplify UI Builder actions on all resources.

December 2, 2021

AdministratorAccess-Amplify – Update to an existing policy

Add policy actions to support the Amazon Cognito authentication feature that uses social identity providers.

Add a policy action to support Lambda layers.

Add a policy action to support the Amplify Storage category.

November 8, 2021

AdministratorAccess-Amplify – Update to an existing policy

Add Amazon Lex actions to support the Amplify Interactions category.

Add Amazon Rekognition actions to support the Amplify Predictions category.

Add an Amazon Cognito action to support MFA configuration on Amazon Cognito user pools.

Add CloudFormation actions to support AWS CloudFormation StackSets.

Add Amazon Location Service actions to support the Amplify Geo category.

Add a Lambda action to support Lambda layers in Amplify.

Add CloudWatch Logs actions to support CloudWatch Events.

Add Amazon S3 actions to support the Amplify Storage category.

Add policy actions to support server-side rendered (SSR) apps.

September 27, 2021

AdministratorAccess-Amplify – Update to an existing policy

Consolidate all Amplify actions into a single amplify:* action.

Add an Amazon S3 action to support encrypting customer Amazon S3 buckets.

Add IAM permission boundary actions to support Amplify apps that have permission boundaries enabled.

Add Amazon SNS actions to support viewing origination phone numbers, and viewing, creating, verifying, and deleting destination phone numbers.

Amplify Studio: Add Amazon Cognito, AWS Lambda, IAM, and AWS CloudFormation policy actions to enable managing backends in the Amplify console and Amplify Studio.

Add an AWS Systems Manager (SSM) policy statement to manage Amplify environment secrets.

Add an AWS CloudFormation ListResources action to support Lambda layers for Amplify apps.

July 28, 2021

Amplify started tracking changes

Amplify started tracking changes for its AWS managed policies.

July 28, 2021