AWS Batch execution IAM role - AWS Batch

AWS Batch execution IAM role

The execution role grants the Amazon ECS container and AWS Fargate agents permission to make AWS API calls on your behalf.


The execution role is supported by Amazon ECS container agent version 1.16.0 and later.

The execution IAM role is required depending on the requirements of your task. You can have multiple execution roles for different purposes and services associated with your account.


For information about the Amazon ECS instance role, see Amazon ECS instance role. For information about service roles, see How AWS Batch works with IAM.

Amazon ECS provides the AmazonECSTaskExecutionRolePolicy managed policy. This policy contains the required permissions for the common use cases described above. It might be necessary to add inline policies to your execution role for the special use cases outlined below.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ecr:GetAuthorizationToken", "ecr:BatchCheckLayerAvailability", "ecr:GetDownloadUrlForLayer", "ecr:BatchGetImage", "logs:CreateLogStream", "logs:PutLogEvents" ], "Resource": "*" } ] }

An execution role is automatically created for you in the AWS Batch console first-run experience. However, you must manually attach the managed IAM policy to let Amazon ECS add permissions for future features and enhancements as they're introduced. You can use the following procedure to check that your account already has the execution role and to attach the managed IAM policy, if needed.

To check for the ecsTaskExecutionRole in the IAM console

  1. Open the IAM console at

  2. In the navigation pane, choose Roles.

  3. Search the list of roles for ecsTaskExecutionRole. If you can't find the role, see Creating the execution IAM role. If you found the role, choose the role to view the attached policies.

  4. On the Permissions tab, verify that the AmazonECSTaskExecutionRolePolicy managed policy is attached to the role. If the policy is attached, your execution role is properly configured. If not, follow the substeps below to attach the policy.

    1. Choose Add permissions, then choose Attach policies.

    2. Search for AmazonECSTaskExecutionRolePolicy.

    3. Check the box to the left of the AmazonECSTaskExecutionRolePolicy policy and choose Attach policies.

  5. Choose Trust relationships.

  6. Verify that the trust relationship contains the following policy. If the trust relationship matches the policy below, the role is configured correctly. If the trust relationship does not match, choose Edit trust policy, enter the following, and choose Update policy.

    { "Version": "2012-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "Service": "" }, "Action": "sts:AssumeRole" } ] }

Creating the execution IAM role

If your account doesn't already have an execution role, use the following steps to create the role.

To create the ecsTaskExecutionRole IAM role

  1. Open the IAM console at

  2. In the navigation pane, choose Roles.

  3. Choose Create role.

  4. For Trusted entity type, choose AWS service.

  5. For Common use case, choose EC2.

  6. Choose Next.

  7. For Permissions policies, search for AmazonECSTaskExecutionRolePolicy.

  8. Choose the check box to the left of the AmazonECSTaskExecutionRolePolicy policy, and then choose Next.

  9. For Role Name, enter ecsTaskExecutionRole and then choose Create role.