An AWS managed policy is a standalone policy that is created and administered by AWS. AWS managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.
Keep in mind that AWS managed policies might not grant least-privilege permissions for your specific use cases because they're available for all AWS customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.
You cannot change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. AWS is most likely to update an AWS managed policy when a new AWS service is launched or new API operations become available for existing services.
For more information, see AWS managed policies in the IAM User Guide.
AWS managed policy:
AdministratorAccess-Amplify
You can attach the AdministratorAccess-Amplify
policy to your IAM
identities. Amplify also attaches this policy to a service role that allows Amplify
to perform actions on your behalf.
When you deploy a backend in the Amplify console, you must create an
Amplify-Backend Deployment
service role that Amplify uses to create
and manage AWS resources. IAM attaches the AdministratorAccess-Amplify
managed policy to the Amplify-Backend Deployment
service role.
This policy grants account administrative permissions while explicitly allowing direct access to resources that Amplify applications require to create and manage backends.
Permissions details
This policy provides access to multiple AWS services, including IAM actions. These
actions allow identities with this policy to use AWS Identity and Access Management to create other identities
with any permissions. This allows permissions escalation and this policy should be
considered as powerful as the AdministratorAccess
policy.
This policy grants the iam:PassRole
action permission for all resources.
This is required to support Amazon Cognito user pools configuration.
To view the permissions for this policy, see AdministratorAccess-Amplify in the AWS Managed Policy Reference.
AWS managed
policy: AmplifyBackendDeployFullAccess
You can attach the AmplifyBackendDeployFullAccess
policy to your IAM
identities.
This policy grants Amplify full access permissions to deploy Amplify backend
resources using the AWS Cloud Development Kit (AWS CDK). Permissions are deferred to the AWS CDK roles that have the
necessary AdministratorAccess
policy permissions.
Permissions details
This policy includes permissions to do the following .
-
Amplify
– Retrieve metadata about deployed applications. -
AWS CloudFormation
– Create, update, and delete Amplify managed stacks. -
SSM
– Create, update, and delete Amplify managed SSM Parameter StoreString
andSecureString
parameters. -
AWS AppSync
– Update and retrieve AWS AppSync schema, resolver and function resources. The purpose is to support the Gen 2 sandbox hotswapping functionality. -
Lambda
– Update and retrieve the configuration for Amplify managed functions. The purpose is to support the Gen 2 sandbox hotswapping functionality.Retrieve a Lambda function's tags. The purpose is to support Lambda functions defined by customers.
-
Amazon S3
– Retrieve Amplify deployment assets. -
AWS Security Token Service
– Enables the AWS Cloud Development Kit (AWS CDK) CLI to assume the deployment role. -
Amazon RDS
– Read metadata of DB instances, clusters, and proxies. -
Amazon EC2
– Read the availability zone information for a subnet. -
CloudWatch Logs
– Retrieve the logs for a customer's Lambda function. The purpose is to allow an Amplify cloud development sandbox environment to stream a Lambda function's logs to a customer's terminal.
To view the permissions for this policy, see AmplifyBackendDeployFullAccess in the AWS Managed Policy Reference.
Amplify updates to AWS managed
policies
View details about updates to AWS managed policies for Amplify since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Document history for AWS Amplify page.
Change | Description | Date |
---|---|---|
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add read access to the |
November 14, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add read access to the |
July 18, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add read access to the
|
May 31, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add a new Add the |
April 17, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add the Add the Add the |
April 5, 2024 |
AdministratorAccess-Amplify – Update to an existing policy |
Add the |
April 4, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add the Add the |
January 02, 2024 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add policy actions to support the |
November 17, 2023 |
AmplifyBackendDeployFullAccess – Update to an existing policy |
Add the |
November 6, 2023 |
AmplifyBackendDeployFullAccess – New policy |
Amplify added a new policy with the minimum permissions required to deploy Amplify backend resources. |
October 8, 2023 |
AdministratorAccess-Amplify – Update to an existing policy |
Add the ecr:DescribeRepositories permission that is
required by the Amplify Command Line Interface (CLI). |
June 1, 2023 |
AdministratorAccess-Amplify – Update to an existing policy |
Add a policy action to support removing tags from an AWS AppSync resource. Add a policy action to support the Amazon Polly resource. Add a policy action to support updating the OpenSearch domain configuration. Add a policy action to support removing tags from an AWS Identity and Access Management role. Add a policy action to support removing tags from an Amazon DynamoDB resource. Add the Add the Add the Add the |
February 24, 2023 |
AdministratorAccess-Amplify – Update to an existing policy |
Add policy actions to allow the Amplify server-side rendering feature to push application metrics to CloudWatch in a customer's AWS account. |
August 30, 2022 |
AdministratorAccess-Amplify – Update to an existing policy |
Add policy actions to block public access to the Amplify deployment Amazon S3 bucket. |
April 27, 2022 |
AdministratorAccess-Amplify – Update to an existing policy |
Add an action to allow customers to delete their server-side rendered (SSR) apps. This also allows the corresponding CloudFront distribution to be deleted successfully. Add an action to allow customers to specify a different Lambda function to handle events from an existing event source using the Amplify CLI. With these changes, AWS Lambda will be able to perform the UpdateEventSourceMapping action. |
April 17, 2022 |
AdministratorAccess-Amplify – Update to an existing policy |
Add a policy action to enable Amplify UI Builder actions on all resources. |
December 2, 2021 |
AdministratorAccess-Amplify – Update to an existing policy |
Add policy actions to support the Amazon Cognito authentication feature that uses social identity providers. Add a policy action to support Lambda layers. Add a policy action to support the Amplify Storage category. |
November 8, 2021 |
AdministratorAccess-Amplify – Update to an existing policy |
Add Amazon Lex actions to support the Amplify Interactions category. Add Amazon Rekognition actions to support the Amplify Predictions category. Add an Amazon Cognito action to support MFA configuration on Amazon Cognito user pools. Add CloudFormation actions to support AWS CloudFormation StackSets. Add Amazon Location Service actions to support the Amplify Geo category. Add a Lambda action to support Lambda layers in Amplify. Add CloudWatch Logs actions to support CloudWatch Events. Add Amazon S3 actions to support the Amplify Storage category. Add policy actions to support server-side rendered (SSR) apps. |
September 27, 2021 |
AdministratorAccess-Amplify – Update to an existing policy |
Consolidate all Amplify actions into a single
Add an Amazon S3 action to support encrypting customer Amazon S3 buckets. Add IAM permission boundary actions to support Amplify apps that have permission boundaries enabled. Add Amazon SNS actions to support viewing origination phone numbers, and viewing, creating, verifying, and deleting destination phone numbers. Amplify Studio: Add Amazon Cognito, AWS Lambda, IAM, and AWS CloudFormation policy actions to enable managing backends in the Amplify console and Amplify Studio. Add an AWS Systems Manager (SSM) policy statement to manage Amplify environment secrets. Add an AWS CloudFormation |
July 28, 2021 |
Amplify started tracking changes |
Amplify started tracking changes for its AWS managed policies. |
July 28, 2021 |