Managed policies for AWS Backup
Managed policies are standalone identity-based policies that you can attach to multiple users, groups, and roles in your AWS account. When you attach a policy to a principal entity, you give the entity the permissions that are defined in the policy.
AWS managed policies are created and administered by AWS. You can't change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to.
Customer managed policies give you fine-grained controls to set access to backups in AWS Backup. For example, you can use them to give your database backup administrator access to Amazon RDS backups but not Amazon EFS ones.
For more information, see Managed policies in the IAM User Guide.
AWS managed policies
AWS Backup provides the following AWS managed policies for common use cases. These policies make it easier to define the right permissions and control access to your backups. There are two types of managed policies. One type is designed to be assigned to users to control their access to AWS Backup. The other type of managed policy is designed to be attached to roles that you pass to AWS Backup. The following table lists all the managed policies that AWS Backup provides and describes how they are defined. You can find these managed policies in the Policies section of the IAM console.
AWSBackupAuditAccess
This policy grants permissions for users to create controls and frameworks that define their expectations for AWS Backup resources and activities, and to audit AWS Backup resources and activities against their defined controls and frameworks. This policy grants permissions to AWS Config and similar services to describe user expectations perform the audits.
This policy also grants permissions to deliver audit reports to Amazon S3 and similar services, and enables users to find and open their audit reports.
To view the permissions for this policy, see AWSBackupAuditAccess in the AWS Managed Policy Reference.
AWSBackupDataTransferAccess
This policy provides permissions for the AWS Backup storage plane data transfer APIs, allowing the AWS Backint agent to complete backup data transfer with the AWS Backup storage plane. You can attach this policy to roles assumed by Amazon EC2 instances running SAP HANA with the Backint agent.
To view the permissions for this policy, see AWSBackupDataTransferAccess in the AWS Managed Policy Reference.
AWSBackupFullAccess
The backup administrator has full access to AWS Backup operations, including creating or editing backup plans, assigning AWS resources to backup plans, and restoring backups. Backup administrators are responsible for determining and enforcing backup compliance by defining backup plans that meet their organization's business and regulatory requirements. Backup administrators also ensure that their organization's AWS resources are assigned to the appropriate plan.
To view the permissions for this policy, see AWSBackupFullAccess in the AWS Managed Policy Reference.
AWSBackupGatewayServiceRolePolicyForVirtualMachineMetadataSync
To view the permissions for this policy, see in the AWS Managed Policy Reference.
AWSBackupOperatorAccess
Backup operators are users that are responsible for ensuring the resources that they are responsible for are properly backed up. Backup operators have permissions to assign AWS resources to the backup plans that the backup administrator creates. They also have permissions to create on-demand backups of their AWS resources and to configure the retention period of on-demand backups. Backup operators do not have permissions to create or edit backup plans or to delete scheduled backups after they are created. Backup operators can restore backups. You can limit the resource types that a backup operator can assign to a backup plan or restore from a backup. You do this by allowing only certain service roles to be passed to AWS Backup that have permissions for a certain resource type.
To view the permissions for this policy, see AWSBackupOperatorAccess in the AWS Managed Policy Reference.
AWSBackupOrganizationAdminAccess
The organization administrator has full access to AWS Organizations operations, including creating, editing, or deleting backup policies, assigning backup policies to accounts and organizational units, and monitoring backup activities within the organization. Organization administrators are responsible for protecting accounts in their organization by defining and assigning backup policies that meet their organization's business and regulatory requirements.
To view the permissions for this policy, see AWSBackupOrganizationAdminAccess in the AWS Managed Policy Reference.
AWSBackupRestoreAccessForSAPHANA
This policy provides AWS Backup permission to restore a backup of SAP HANA on Amazon EC2.
To view the permissions for this policy, see AWSBackupRestoreAccessForSAPHANA in the AWS Managed Policy Reference.
AWSBackupServiceLinkedRolePolicyForBackup
This policy is attached to the service-linked role named AWSServiceRoleforBackup to allow AWS Backup to call AWS services on your behalf to manage your backups. For more information, see Using roles to back up and copy.
To view the permissions for this policy, see AWSBackupServiceLinkedRolePolicyforBackup in the AWS Managed Policy Reference.
AWSBackupServiceLinkedRolePolicyForBackupTest
To view the permissions for this policy, see AWSBackupServiceLinkedRolePolicyForBackupTest in the AWS Managed Policy Reference.
AWSBackupServiceRolePolicyForBackup
Provides AWS Backup permissions to create backups of all supported resource types on your behalf.
To view the permissions for this policy, see AWSBackupServiceRolePolicyForBackup in the AWS Managed Policy Reference.
AWSBackupServiceRolePolicyForItemRestores
Description
This policy grants users permissions to restore individual files and items in a snapshot (periodic backup recovery point) to a new or existing Amazon S3 bucket or new Amazon EBS volume. These permissions include: read permissions to Amazon EBS for snapshots managed by AWS Backup read/write permissions to Amazon S3 buckets, and generate and describe permissions for AWS KMS keys.
Using this policy
You can attach AWSBackupServiceRolePolicyForItemRestores
to your users,
groups, and roles.
Policy details
-
Type: AWS managed policy
-
Creation time: 21 November 2024, 22:45 UTC
-
Edited time: First instance
-
ARN:
arn:aws:iam::aws:policy/AWSBackupServiceRolePolicyForItemRestores
Policy version: v1 (default)
This policy’s version defines the permissions for the policy. When the user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request or not.
JSON policy document:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "EBSReadOnlyPermissions", "Effect": "Allow", "Action": [ "ec2:DescribeSnapshots" ], "Resource": "arn:aws:ec2:*::snapshot/*" }, { "Sid": "KMSReadOnlyPermissions", "Effect": "Allow", "Action": "kms:DescribeKey", "Resource": "*" }, { "Sid": "EBSDirectReadAPIPermissions", "Effect": "Allow", "Action": [ "ebs:ListSnapshotBlocks", "ebs:GetSnapshotBlock" ], "Resource": "arn:aws:ec2:*::snapshot/*" }, { "Sid": "S3ReadonlyPermissions", "Effect": "Allow", "Action": [ "s3:GetBucketLocation", "s3:ListBucket" ], "Resource": "arn:aws:s3:::*" }, { "Sid": "S3PermissionsForFileLevelRestore", "Effect": "Allow", "Action": [ "s3:PutObject", "s3:AbortMultipartUpload", "s3:ListMultipartUploadParts" ], "Resource": "arn:aws:s3:::*/*" }, { "Sid": "KMSDataKeyForS3AndEC2Permissions", "Effect": "Allow", "Action": [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource": "arn:aws:kms:*:*:key/*", "Condition": { "StringLike": { "kms:ViaService": [ "ec2.*.amazonaws.com", "s3.*.amazonaws.com" ] } } } ] }
AWSBackupServiceRolePolicyForIndexing
Description
This policy grants users permissions to index snapshot, also known as periodic, recovery points. These permissions include: read permissions to Amazon EBS for snapshots managed by AWS Backup read/write permissions to Amazon S3 buckets, and generate and describe permissions for AWS KMS keys.
Using this policy
You can attach AWSBackupServiceRolePolicyForIndexing
to your users,
groups, and roles.
Policy details
-
Type: AWS managed policy
-
Edited time: First instance
-
ARN:
arn:aws:iam::aws:policy/AWSBackupServiceRolePolicyForIndexing
Policy version: v1 (default)
This policy’s version defines the permissions for the policy. When the user or or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request or not.
JSON policy document:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "EBSReadOnlyPermissions", "Effect": "Allow", "Action": [ "ec2:DescribeSnapshots" ], "Resource": "arn:aws:ec2:*::snapshot/*" }, { "Sid": "KMSReadOnlyPermissions", "Effect": "Allow", "Action": "kms:DescribeKey", "Resource": "*" }, { "Sid": "EBSDirectReadAPIPermissions", "Effect": "Allow", "Action": [ "ebs:ListSnapshotBlocks", "ebs:GetSnapshotBlock" ], "Resource": "arn:aws:ec2:*::snapshot/*" }, { "Sid": "KMSDataKeyForEC2Permissions", "Effect": "Allow", "Action": [ "kms:Decrypt", "kms:GenerateDataKey" ], "Resource": "arn:aws:kms:*:*:key/*", "Condition": { "StringLike": { "kms:ViaService": [ "ec2.*.amazonaws.com" ] } } } ] }
AWSBackupServiceRolePolicyForRestores
Provides AWS Backup permissions to restore backups of all supported resource types on your behalf.
To view the permissions for this policy, see AWSBackupServiceRolePolicyForRestores in the AWS Managed Policy Reference.
For EC2 instance restores, you must also include the following permissions to launch the EC2 instance:
{ "Version": "2012-10-17", "Statement": [ { "Action": "iam:PassRole", "Resource": "arn:aws:iam::
account-id
:role/role-name
", "Effect": "Allow" } ] }
AWSBackupServiceRolePolicyForS3Backup
This policy contains the permissions necessary for AWS Backup to back up any S3 bucket. This includes access to all objects in a bucket and any associated AWS KMS key.
To view the permissions for this policy, see AWSBackupServiceRolePolicyForS3Backup in the AWS Managed Policy Reference.
AWSBackupServiceRolePolicyForS3Restore
This policy contains permissions necessary for AWS Backup to restore an S3 backup to a bucket. This includes read and write permissions to the buckets and the usage of any AWS KMS key in regards to S3 operations.
To view the permissions for this policy, see AWSBackupServiceRolePolicyForS3Restore in the AWS Managed Policy Reference.
AWSServiceRolePolicyForBackupReports
AWS Backup uses this policy for the AWSServiceRoleForBackupReports service-linked role. This service-linked role gives AWS Backup permissions to monitor and report on the compliance of your backup settings, jobs, and resources with your frameworks.
To view the permissions for this policy, see AWSServiceRolePolicyForBackupReports in the AWS Managed Policy Reference.
AWSServiceRolePolicyForBackupRestoreTesting
To view the permissions for this policy, see AWSServiceRolePolicyForBackupRestoreTesting in the AWS Managed Policy Reference.
Customer managed policies
The following sections describe the recommended backup and restore permissions for the AWS services and third-party application supported by AWS Backup. You can use the existing AWS managed policies as a model as you create your own policy documents, and then customize them to further restrict access to your AWS resources.
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
DynamoDBBackupPermissions
RDSClusterModifyPermissions
GetResourcesPermissions
BackupVaultPermissions
KMSPermissions
Restore
Start with the RDSPermissions
statement from AWSBackupServiceRolePolicyForRestores.
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
DynamoDBPermissions
DynamoDBBackupResourcePermissions
DynamodbBackupPermissions
KMSDynamoDBPermissions
Restore
Start with the following statements from AWSBackupServiceRolePolicyForRestores:
DynamoDBPermissions
DynamoDBBackupResourcePermissions
DynamoDBRestorePermissions
KMSPermissions
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
EBSResourcePermissions
EBSTagAndDeletePermissions
EBSCopyPermissions
EBSSnapshotTierPermissions
GetResourcesPermissions
BackupVaultPermissions
Restore
Start with the EBSPermissions
statement from AWSBackupServiceRolePolicyForRestores.
Add the following statement.
{ "Effect":"Allow", "Action": [ "ec2:DescribeSnapshots", "ec2:DescribeVolumes" ], "Resource":"*" },
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
EBSCopyPermissions
EC2CopyPermissions
EC2Permissions
EC2TagPermissions
EC2ModifyPermissions
EBSResourcePermissions
GetResourcesPermissions
BackupVaultPermissions
Restore
Start with the following statements from AWSBackupServiceRolePolicyForRestores:
EBSPermissions
EC2DescribePermissions
EC2RunInstancesPermissions
EC2TerminateInstancesPermissions
EC2CreateTagsPermissions
Add the following statement.
{ "Effect": "Allow", "Action": "iam:PassRole", "Resource": "arn:aws:iam::
account-id
:role/role-name
" },
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
EFSPermissions
GetResourcesPermissions
BackupVaultPermissions
Restore
Start with the EFSPermissions
statement from AWSBackupServiceRolePolicyForRestores.
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
FsxBackupPermissions
FsxCreateBackupPermissions
FsxPermissions
FsxVolumePermissions
FsxListTagsPermissions
FsxDeletePermissions
FsxResourcePermissions
KMSPermissions
Restore
Start with the following statements from AWSBackupServiceRolePolicyForRestores:
FsxPermissions
FsxTagPermissions
FsxBackupPermissions
FsxDeletePermissions
FsxDescribePermissions
FsxVolumeTagPermissions
FsxBackupTagPermissions
FsxVolumePermissions
DSPermissions
KMSDescribePermissions
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
DynamoDBBackupPermissions
RDSClusterModifyPermissions
GetResourcesPermissions
BackupVaultPermissions
KMSPermissions
Restore
Start with the RDSPermissions
statement from AWSBackupServiceRolePolicyForRestores.
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
DynamoDBBackupPermissions
RDSBackupPermissions
RDSClusterModifyPermissions
GetResourcesPermissions
BackupVaultPermissions
KMSPermissions
Restore
Start with the RDSPermissions
statement from AWSBackupServiceRolePolicyForRestores.
Backup
Start with AWSBackupServiceRolePolicyForS3Backup.
Add the BackupVaultPermissions
and BackupVaultCopyPermissions
statements if you need to copy backups to a different account.
Restore
Start with AWSBackupServiceRolePolicyForS3Restore.
Backup
Start with the following statements from AWSBackupServiceRolePolicyForBackup:
StorageGatewayPermissions
EBSTagAndDeletePermissions
GetResourcesPermissions
BackupVaultPermissions
Add the following statement.
{ "Effect": "Allow", "Action": [ "ec2:DescribeSnapshots" ], "Resource":"*" },
Restore
Start with the following statements from AWSBackupServiceRolePolicyForRestores:
StorageGatewayVolumePermissions
StorageGatewayGatewayPermissions
StorageGatewayListPermissions
Backup
Start with the BackupGatewayBackupPermissions
statement from AWSBackupServiceRolePolicyForBackup.
Restore
Start with the GatewayRestorePermissions
statement from AWSBackupServiceRolePolicyForRestores.
Encrypted backup
To restore an encrypted backup, do one of the following
-
Add your role to the allowlist for the AWS KMS key policy
-
Add the following statements from AWSBackupServiceRolePolicyForRestores to your IAM role for restores:
KMSDescribePermissions
KMSPermissions
KMSCreateGrantPermissions
Policy updates for AWS Backup
View details about updates to AWS managed policies for AWS Backup since this service began tracking these changes.
Change | Description | Date |
---|---|---|
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
AWS Backup added the permission This permission is necessary to complete operations when a customer chooses to create a cross-account copy of a multi-tenant RDS snapshot. |
January 8, 2025 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
AWS Backup added the permissions These permissions are necessary to complete customer operations for restoring multi-tenant snapshots. |
January 8, 2025 |
AWSBackupServiceRolePolicyForItemRestores – Added a new AWS managed policy | AWS Backup added the AWSBackupServiceRolePolicyForItemRestores
AWS managed policy. |
November 26, 2024 |
AWSBackupServiceRolePolicyForIndexing – Added a new AWS managed policy | AWS Backup added the AWSBackupServiceRolePolicyForIndexing
AWS managed policy. |
November 26, 2024 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
AWS Backup added permission The permission is necessary to obtain tagging permissions during the creation of a recovery point. |
May 17, 2024 |
AWSBackupServiceRolePolicyForS3Backup – Update to an existing policy |
AWS Backup added permission The permission is necessary to obtain tagging permissions during the creation of a recovery point. |
May 17, 2024 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
AWS Backup added permission The permission is necessary to obtain tagging permissions during the creation of a recovery point. |
May 17, 2024 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy | Added the permission This permission is necessary for AWS Backup to support continuous backup and point-in-time-restore of Amazon RDS instances. |
May 1, 2024 |
AWSBackupFullAccess – Update to an existing policy | AWS Backup updated the Amazon Resource Name (ARN) in permission
|
May 1, 2024 |
AWSBackupOperatorAccess – Update to an existing policy | AWS Backup updated the Amazon Resource Name (ARN) in permission
|
May 1, 2024 |
AWSServiceRolePolicyForBackupRestoreTesting – Update to an existing policy |
Added the following permissions to describe and list recovery points
and protected resources in order to conduct restore testing plans:
Added the permission Added the permission
Added the following permissions to support restore testing of Amazon Redshift
backups: Added the permission |
February 14, 2024 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the permissions These permissions are necessary for users to have the option to restore Amazon EBS resources stored with AWS Backup from archive storage. For EC2 instance restores, you must also include permissions as shown in the following policy statement to launch the EC2 instance: |
November 27, 2023 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added the permissions These permissions are necessary for users to have the option to transition Amazon EBS resources stored with AWS Backup to archive storage. |
November 27, 2023 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added the permissions These permissions are necessary for users to have the option to transition Amazon EBS resources stored with AWS Backup to archive storage. Added the permissions |
|
AWSServiceRolePolicyForBackupRestoreTesting – New policy |
Provides the permissions necessary to conduct restore testing.
The permissions include the actions |
November 27, 2023 |
AWSBackupFullAccess – Update to an existing policy |
Added |
November 27, 2023 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy | Added the permissions |
September 6, 2023 |
AWSBackupFullAccess – Update to an existing policy | Added the permission
|
September 6, 2023 |
AWSBackupOperatorAccess – Update to an existing policy | Added the permission
|
September 6, 2023 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added the permission
Added the permission Added the permission |
September 6, 2023 |
AWSBackupFullAccess – Update to an existing policy |
Added the action |
August 8, 2023 |
AWSBackupOperatorAccess – Update to an existing policy |
Added the action |
August 8, 2023 |
AWSBackupServiceRolePolicyForS3Backup – Update to an existing policy |
Added the permission |
August 1, 2023 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the following actions to grant the user permissions to add tags
to restore resources: |
May 22, 2023 |
AWSBackupAuditAccess – Update to an existing policy |
Replaced the resource selection within the API
|
April 11, 2023 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the following permission to restore Amazon EFS using a customer
managed key: |
March 27, 2023 |
AWSServiceRolePolicyForBackupReports – Update to an existing policy |
Updated the |
March 9, 2023 |
AWSBackupServiceRolePolicyForS3Restore – Update to an existing policy |
Added the following permissions: |
February 13, 2023 |
AWSBackupFullAccess – Update to an existing policy | Added the following permissions to schedule backups using VMware
tags of virtual machines and to support schedule-based bandwidth throttling:
|
December 15, 2022 |
AWSBackupOperatorAccess – Update to an existing policy | Added the following permissions to schedule backups using VMware
tags of virtual machines and to support schedule-based bandwidth throttling:
|
December 15, 2022 |
AWSBackupGatewayServiceRolePolicyForVirtualMachineMetadataSync – New policy |
Provides permissions for AWS Backup Gateway to sync the metadata of virtual machines in on-premise networks with Backup Gateway. |
December 15, 2022 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy | Added the following permissions to support Timestream backup jobs:
|
December 13, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy | Added the following permissions to support Timestream restore jobs:
|
December 13, 2022 |
AWSBackupFullAccess – Update to an existing policy | Added the following permissions to support Timestream resources:
|
December 13, 2022 |
AWSBackupOperatorAccess – Update to an existing policy | Added the following permissions to support Timestream resources:
|
December 13, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy | Added the following permissions to support Timestream resources:
|
December 13, 2022 |
AWSBackupFullAccess – Update to an existing policy | Added the following permissions to support Amazon Redshift resources:
|
November 27, 2022 |
AWSBackupOperatorAccess – Update to an existing policy | Added the following permissions to support Amazon Redshift resources:
|
November 27, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the following permissions to support Amazon Redshift restore jobs:
|
November 27, 2022 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added the following permissions to support Amazon Redshift backup jobs:
|
November 27, 2022 |
AWSBackupFullAccess – Update to an existing policy | Added the following permission to support CloudFormation resources:
|
November 27, 2022 |
AWSBackupOperatorAccess – Update to an existing policy | Added the following permission to support CloudFormation resources:
|
November 27, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy | Added the following permissions to support CloudFormation resources:
|
November 27, 2022 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy | Added the following permissions to support AWS CloudFormation application stack backup jobs:
|
November 16, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy | Added the following permissions to support AWS CloudFormation application stack backup jobs:
|
November 16, 2022 |
AWSBackupOrganizationAdminAccess – Update to an existing policy | Added the following permissions to this policy to allow organization administrators
to usethe Delegated Administrator feature:
|
November 27, 2022 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy | Added the following permissions to support SAP HANA on Amazon EC2 instances:
|
November 20, 2022 |
AWSBackupFullAccess – Update to an existing policy | Added the following permissions to support SAP HANA on Amazon EC2 instances:
|
November 20, 2022 |
AWSBackupOperatorAccess – Update to an existing policy | Added the following permissions to support SAP HANA on Amazon EC2 instances:
|
November 20, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy | Added the following permission to support SAP HANA on Amazon EC2 instances:
|
November 20, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy | Added the following permission to support Backup gateway restore
jobs to an EC2 instance:
|
November 20, 2022 |
AWSBackupDataTransferAccess – Update to an existing policy | Added the following permissions to support secure storage data
transfer for SAP HANA On Amazon EC2 resources:
|
November 20, 2022 |
AWSBackupRestoreAccessForSAPHANA – Update to an existing policy | Added the following permissions for resource owners to perform restore of
SAP HANA On Amazon EC2 resources:
|
November 20, 2022 |
AWSBackupServiceRolePolicyForS3Backup – Update to an existing policy |
Added the permission |
August 24, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the following actions to grant access to create a database
instance to support multi-Availability Zone (Multi-AZ) functionality:
|
July 20, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added the |
May 6, 2022 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added volume resources in the scope of existing
|
April 27, 2022 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the following actions to grant the users permissions to restore
FSx for ONTAP volumes |
April 27, 2022 |
AWSBackupServiceRolePolicyForS3Backup – Update to an existing policy |
Added the following actions to grant the user permissions to receive
notifications of changes to their Amazon S3 buckets during backup operations:
|
February 25, 2022 |
AWSBackupServiceRolePolicyForS3Backup – New policy |
Added the following actions to grant the user permissions to back
up their Amazon S3 buckets: Added the following actions to grant the user permissions to back up
their Amazon S3 objects: Added the following actions to grant the user permissions to back up
their encrypted Amazon S3 data: Added the following actions to grant the user permissions to take
incremental backups of their Amazon S3 data using Amazon EventBridge rules:
|
February 17, 2022 |
AWSBackupServiceRolePolicyForS3Restore – New policy |
Added the following actions to grant the user permissions to
restore their Amazon S3 buckets: Added the following actions to grant the user permissions to restore
their Amazon S3 buckets: Added the following actions to grant the user permissions to encrypt
their restored Amazon S3 data: |
February 17, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added |
February 14, 2022 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added Added |
November 30, 2021 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added |
November 30, 2021 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added |
November 30, 2021 |
AWSBackupFullAccess – Update to an existing policy |
Added the following actions to grant the users permissions to use
AWS Backup Gateway to back up, restore, and manage their virtual machines:
|
November 30, 2021 |
AWSBackupOperatorAccess – Update to an existing policy |
Added the following actions to grant the user permissions to back up
their virtual machines: |
November 30, 2021 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added |
November 23, 2021 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added Added |
November 23, 2021 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added |
November 23, 2021 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added |
November 23, 2021 |
AWSBackupOperatorAccess – Update to an existing policy |
Removed the actions
AWS Backup did not need both |
November 23, 2021 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added the new actions
|
November 10, 2021 |
AWSBackupAuditAccess – New policy |
Added |
August 24, 2021 |
AWSServiceRolePolicyForBackupReports – New policy |
Added |
August 24, 2021 |
AWSBackupFullAccess – Update to an existing policy |
Added |
July 5, 2021 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added the new action |
July 5, 2021 |
AWSBackupOperatorAccess – Update to an existing policy |
Removed the actions
AWS Backup did not need both |
May 25, 2021 |
AWSBackupOperatorAccess – Update to an existing policy |
Removed the actions
AWS Backup did not need both |
May 25, 2021 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the new action |
May 24, 2021 |
AWSBackupServiceRolePolicyForRestores – Update to an existing policy |
Added the new actions |
May 24, 2021 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Added the new action |
April 12, 2021 |
AWSBackupServiceLinkedRolePolicyForBackup – Update to an existing policy |
Added the new action |
April 12, 2021 |
AWSBackupServiceRolePolicyForBackup – Update to an existing policy |
Updated to comply with the following requirement: For AWS Backup to create a backup of an encrypted DynamoDB table, you must add the
permissions |
March 10, 2021 |
AWSBackupFullAccess – Update to an existing policy |
Updated to comply with the following requirements: To use AWS Backup to configure continuous backups for your Amazon RDS database, verify
the API permission To restore Amazon RDS continuous backups, you must add the permission
In the AWS Backup console, to describe the range of times available for
point-in-time recovery, you must include the
|
March 10, 2021 |
AWS Backup started tracking changes |
AWS Backup started tracking changes for its AWS-managed policies. |
March 10, 2021 |