

# Using condition keys to limit access to CloudWatch
<a name="reference_policies_condition-keys"></a>

See the following topics to learn about the service-specific condition keys that can be used in the `Condition` element of an IAM policy. You can use these keys to further refine the conditions under which the policy statement applies.
+ [Using condition keys to limit access to CloudWatch namespaces](iam-cw-condition-keys-namespace.md)
+ [Using condition keys to limit Contributor Insights users' access to log groups](iam-cw-condition-keys-contributor.md)
+ [Using condition keys to limit alarm actions](iam-cw-condition-keys-alarm-actions.md)
+ [Condition keys for CloudWatch Observability Admin](condition-keys-observabilityadmin.md)

To see the global condition keys that are available to all services, see [Available global condition keys](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html).