Using roles to maintain Quick Setup-provisioned resource health and consistency - AWS Systems Manager

Using roles to maintain Quick Setup-provisioned resource health and consistency

Systems Manager uses the service-linked role named AWSServiceRoleForSSMQuickSetup.

AWSServiceRoleForSSMQuickSetup service-linked role permissions for Systems Manager

The AWSServiceRoleForSSMQuickSetup service-linked role trusts the following services to assume the role:

  • ssm-quicksetup.amazonaws.com

The role permissions policy allows Systems Manager to complete the following actions on the specified resources:

  • AWS Systems Manager uses this IAM service role to check configuration health, ensure consistent use of parameters and provisioned resources, and remediate resources when drift is detected.

The managed policy that is used to provide permissions for the AWSServiceRoleForSSMQuickSetup role is SSMQuickSetupRolePolicy. SSMQuickSetupRolePolicy provides permissions for the following services:

ssm (Systems Manager) – Reads information about the state that configured resources are intended to be in.

organizations (AWS Organizations) – Reads information about the member accounts that belong to an organization as configured in Organizations.

cloudformation (AWS CloudFormation) – Reads information about CloudFormation stacks used to manage the state of resources and CloudFormation stackset operations.

The content of the policy is as follows:

{ "Version": "2012-10-17", "Statement": [{ "Sid": "SSMResourceDataSyncListPermissions", "Action": [ "ssm:ListResourceDataSync" ], "Resource": "*", "Effect": "Allow" }, { "Sid": "SSMDocumentReadOnlyPermissions", "Action": [ "ssm:DescribeDocument", "ssm:GetDocument" ], "Resource": "*", "Effect": "Allow" }, { "Sid": "OrganizationReadOnlyPermissions", "Action": [ "organizations:ListRoots", "organizations:ListAWSServiceAccessForOrganization", "organizations:ListDelegatedAdministrators", "organizations:ListAccountsForParent", "organizations:ListOrganizationalUnitsForParent", "organizations:DescribeOrganizationalUnit" ], "Resource": "*", "Effect": "Allow" }, { "Sid": "QuickSetupStackSetReadOnlyPermissions", "Action": [ "cloudformation:DescribeStackSetOperation", "cloudformation:ListStackInstances", "cloudformation:ListStackSetOperations", "cloudformation:ListStackSetOperationResults" ], "Resource": [ "arn:aws:cloudformation:*:*:stackset/AWS-QuickSetup-*", "arn:aws:cloudformation:*:*:stack/StackSet-AWS-QuickSetup-*" ], "Effect": "Allow" }, { "Sid": "QuickSetupStackSetDeletePermissions", "Action": [ "cloudformation:DeleteStackInstances", "cloudformation:DeleteStackSet" ], "Resource": [ "arn:aws:cloudformation:*:*:stackset/AWS-QuickSetup-*", "arn:aws:cloudformation:*:*:stack/StackSet-AWS-QuickSetup-*" ], "Effect": "Allow" } ] }

You must configure permissions to allow an IAM entity (such as a user, group, or role) to create, edit, or delete a service-linked role. For more information, see Service-linked role permissions in the IAM User Guide.

Creating the AWSServiceRoleForSSMQuickSetup service-linked role for Systems Manager

You don't need to manually create the AWSServiceRoleForSSMQuickSetup service-linked role. When you create a Quick Setup configuration in the AWS Management Console, Systems Manager creates the service-linked role for you.

Editing the AWSServiceRoleForSSMQuickSetup service-linked role for Systems Manager

Systems Manager does not allow you to edit the AWSServiceRoleForSSMQuickSetup service-linked role. After you create a service-linked role, you cannot change the name of the role because various entities might reference the role. However, you can edit the description of the role using IAM. For more information, see Editing a service-linked role in the IAM User Guide.

Deleting the AWSServiceRoleForSSMQuickSetup service-linked role for Systems Manager

If you no longer need to use a feature or service that requires a service-linked role, we recommend that you delete that role. That way you don’t have an unused entity that is not actively monitored or maintained. However, you must clean up your service-linked role before you can manually delete it.

Cleaning up the AWSServiceRoleForSSMQuickSetup service-linked role

Before you can use IAM to delete the AWSServiceRoleForSSMQuickSetup service-linked role, you must first delete the Quick Setup configurations that are using the role. For more information, see Editing and deleting your configuration.

Manually delete the AWSServiceRoleForSSMQuickSetup service-linked role

Use the IAM console, the AWS CLI, or the AWS API to delete the AWSServiceRoleForSSMQuickSetup service-linked role. For more information, see the following topic:

Supported Regions for the Systems Manager  AWSServiceRoleForSSMQuickSetup service-linked role

Systems Manager does not support using service-linked roles in every Region where the service is available. You can use the AWSServiceRoleForSSMQuickSetup role in the following Regions.

  • US East (Ohio)

  • US East (N. Virginia)

  • US West (N. California)

  • US West (Oregon)

  • Asia Pacific (Mumbai)

  • Asia Pacific (Seoul)

  • Asia Pacific (Singapore)

  • Asia Pacific (Sydney)

  • Asia Pacific (Tokyo)

  • Canada (Central)

  • Europe (Frankfurt)

  • Europe (Stockholm)

  • Europe (Ireland)

  • Europe (London)

  • Europe (Paris)

  • South America (São Paulo)