AWSBackupServiceRolePolicyForS3Backup - AWS Managed Policy

AWSBackupServiceRolePolicyForS3Backup

Description: Policy containing permissions necessary for AWS Backup to backup data in any S3 bucket. This includes read access to all S3 objects and any decrypt access for all KMS keys.

AWSBackupServiceRolePolicyForS3Backup is an AWS managed policy.

Using this policy

You can attach AWSBackupServiceRolePolicyForS3Backup to your users, groups, and roles.

Policy details

  • Type: AWS managed policy

  • Creation time: February 18, 2022, 17:40 UTC

  • Edited time: May 17, 2024, 17:12 UTC

  • ARN: arn:aws:iam::aws:policy/AWSBackupServiceRolePolicyForS3Backup

Policy version

Policy version: v4 (default)

The policy's default version is the version that defines the permissions for the policy. When a user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request.

JSON policy document

{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "CloudWatchGetMetricDataPermissions", "Effect" : "Allow", "Action" : "cloudwatch:GetMetricData", "Resource" : "*" }, { "Sid" : "EventBridgePermissionsForAwsBackupManagedRule", "Effect" : "Allow", "Action" : [ "events:DeleteRule", "events:PutTargets", "events:DescribeRule", "events:EnableRule", "events:PutRule", "events:RemoveTargets", "events:ListTargetsByRule", "events:DisableRule" ], "Resource" : [ "arn:aws:events:*:*:rule/AwsBackupManagedRule*" ] }, { "Sid" : "EventBridgeListRulesPermissions", "Effect" : "Allow", "Action" : "events:ListRules", "Resource" : "*" }, { "Sid" : "KmsPermissions", "Effect" : "Allow", "Action" : [ "kms:Decrypt", "kms:DescribeKey" ], "Resource" : "*", "Condition" : { "StringLike" : { "kms:ViaService" : "s3.*.amazonaws.com" } } }, { "Sid" : "S3BucketPermissions", "Effect" : "Allow", "Action" : [ "s3:GetBucketTagging", "s3:GetInventoryConfiguration", "s3:ListBucketVersions", "s3:ListBucket", "s3:GetBucketVersioning", "s3:GetBucketLocation", "s3:GetBucketAcl", "s3:PutInventoryConfiguration", "s3:GetBucketNotification", "s3:PutBucketNotification" ], "Resource" : "arn:aws:s3:::*" }, { "Sid" : "S3ObjectPermissions", "Effect" : "Allow", "Action" : [ "s3:GetObjectAcl", "s3:GetObject", "s3:GetObjectVersionTagging", "s3:GetObjectVersionAcl", "s3:GetObjectTagging", "s3:GetObjectVersion" ], "Resource" : "arn:aws:s3:::*/*" }, { "Sid" : "S3ListBucketPermissions", "Effect" : "Allow", "Action" : "s3:ListAllMyBuckets", "Resource" : "*" }, { "Sid" : "RecoveryPointTaggingPermissions", "Effect" : "Allow", "Action" : [ "backup:TagResource" ], "Resource" : "arn:aws:backup:*:*:recovery-point:*", "Condition" : { "StringEquals" : { "aws:PrincipalAccount" : "${aws:ResourceAccount}" } } } ] }

Learn more