AWS managed policies for AWS DataSync
To add permissions to users, groups, and roles, it's easier to use AWS managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see AWS managed policies in the IAM User Guide.
AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.
Additionally, AWS supports managed policies for job functions that span multiple
services. For example, the ReadOnlyAccess
AWS managed policy provides read-only
access to all AWS services and resources. When a service launches a new feature, AWS adds
read-only permissions for new operations and resources. For a list and descriptions of job
function policies, see AWS managed policies for
job functions in the IAM User Guide.
AWS managed policy: AWSDataSyncReadOnlyAccess
You can attach the AWSDataSyncReadOnlyAccess
policy to your IAM identities.
This policy grants read-only permissions for DataSync.
{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncReadOnlyAccessPermissions", "Effect": "Allow", "Action": [ "datasync:Describe*", "datasync:List*", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "fsx:DescribeFileSystems", "iam:GetRole", "iam:ListRoles", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "s3:ListAllMyBuckets", "s3:ListBucket" ], "Resource": "*" }] }
AWS managed policy: AWSDataSyncFullAccess
You can attach the AWSDataSyncFullAccess
policy to your IAM identities.
This policy grants administrative permissions for DataSync and is required for
AWS Management Console access to the service. AWSDataSyncFullAccess
provides full
access to DataSync API operations and the operations that describe related resources (such as
Amazon S3 buckets and Amazon EFS file systems). The policy also grants permissions for Amazon CloudWatch,
including creating log groups and creating or updating a resource policy.
{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncFullAccessPermissions", "Effect": "Allow", "Action": [ "datasync:*", "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission", "ec2:DeleteNetworkInterface", "ec2:DescribeNetworkInterfaces", "ec2:DescribeRegions", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcEndpoints", "ec2:ModifyNetworkInterfaceAttribute", "fsx:DescribeFileSystems", "fsx:DescribeStorageVirtualMachines", "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "iam:GetRole", "iam:ListRoles", "logs:CreateLogGroup", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "outposts:ListOutposts", "s3:GetBucketLocation", "s3:ListAllMyBuckets", "s3:ListBucket", "s3:ListBucketVersions", "s3-outposts:ListAccessPoints", "s3-outposts:ListRegionalBuckets" ], "Resource": "*" }, { "Sid": "DataSyncPassRolePermissions", "Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "*", "Condition": { "StringEquals": { "iam:PassedToService": [ "datasync.amazonaws.com" ] } } }, { "Sid": "DataSyncCreateSLRPermissions", "Effect": "Allow", "Action": [ "iam:CreateServiceLinkedRole" ], "Resource": "arn:aws:iam::*:role/aws-service-role/datasync.amazonaws.com/AWSServiceRoleForDataSync", "Condition": { "StringEquals": { "iam:AWSServiceName": "datasync.amazonaws.com" } } } ] }
AWS managed policy: AWSDataSyncDiscoveryServiceRolePolicy
You can't attach the AWSDataSyncDiscoveryServiceRolePolicy
policy to your
IAM identities. This policy is attached to a service-linked role that allows DataSync to
perform actions on your behalf. For more information, see Using service-linked roles for
DataSync.
AWS managed policy: AWSDataSyncServiceRolePolicy
You can't attach the AWSDataSyncServiceRolePolicy
policy to your IAM
identities. This policy is attached to a service-linked role that allows DataSync to perform
actions on your behalf. For more information, see Using service-linked roles for
DataSync.
This policy grants administrative permissions that allow the service-linked role to create Amazon CloudWatch logs for DataSync tasks using Enhanced mode.
Policy updates
Change | Description | Date |
---|---|---|
AWSDataSyncServiceRolePolicy – New policy |
DataSync added a policy that's used by the DataSync service-linked role
|
October 30, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets DataSync create service-linked roles for you. |
October 30, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets you choose opt-in Regions when creating a DataSync task for transfers between AWS Regions. |
July 22, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new a permission to
This permission lets you choose a specific version of your DataSync manifest. |
February 16, 2024 |
AWSDataSyncFullAccess – Change |
DataSync added new permissions to
These permissions help you create DataSync agents and locations for Amazon EFS, Amazon FSx for NetApp ONTAP, Amazon S3, and S3 on Outposts. |
May 2, 2023 |
DataSync started tracking changes |
DataSync started tracking changes for its AWS managed policies. |
March 1, 2021 |