Using IAM policies to delegate Security Hub access to IAM identities - AWS Security Hub

Using IAM policies to delegate Security Hub access to IAM identities

By default, access to the Security Hub resources is restricted to the owner of the account that the resources were created in.

If you're the owner, you can choose to grant full or limited access to Security Hub to the various IAM identities in your account. For more information about creating IAM access policies, see Controlling access using policies.

AWS managed (predefined) policies for Security Hub

AWS addresses many common use cases by providing standalone IAM policies that AWS creates and administers. These managed policies grant necessary permissions for common use cases so that you don't have to investigate which permissions are needed. For more information, see AWS managed policies in the IAM User Guide.

The following AWS managed policies, which you can attach to users in your account, are specific to Security Hub:

  • AWSSecurityHubFullAccess – Provides access to all Security Hub functionality

  • AWSSecurityHubReadOnlyAccess – Provides read-only access to Security Hub

Resources defined by Security Hub

The following resource types are defined by this service and can be used in the Resource element of IAM permission policy statements.

Resource type






Condition keys defined by Security Hub

Security Hub defines the following condition keys that you can use in the Condition element of an IAM policy.

You can use these keys to further refine the conditions under which the policy statement applies.

Condition keys




The ID of the AWS account associated with a finding.

In the AWS Security Finding Format (ASFF), this the AwsAccountId field.



The path to an ASFF field for which to restrict updates from BatchUpdateFindings.