AWS managed policies for AWS DataSync - AWS DataSync

AWS managed policies for AWS DataSync

To add permissions to users, groups, and roles, it's easier to use AWS managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see AWS managed policies in the IAM User Guide.

AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.

Additionally, AWS supports managed policies for job functions that span multiple services. For example, the ReadOnlyAccess AWS managed policy provides read-only access to all AWS services and resources. When a service launches a new feature, AWS adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see AWS managed policies for job functions in the IAM User Guide.

AWS managed policy: AWSDataSyncReadOnlyAccess

You can attach the AWSDataSyncReadOnlyAccess policy to your IAM identities.

This policy grants read-only permissions for DataSync.

{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncReadOnlyAccessPermissions", "Effect": "Allow", "Action": [ "datasync:Describe*", "datasync:List*", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "fsx:DescribeFileSystems", "iam:GetRole", "iam:ListRoles", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "s3:ListAllMyBuckets", "s3:ListBucket" ], "Resource": "*" }] }

AWS managed policy: AWSDataSyncFullAccess

You can attach the AWSDataSyncFullAccess policy to your IAM identities.

This policy grants administrative permissions for DataSync and is required for AWS Management Console access to the service. AWSDataSyncFullAccess provides full access to DataSync API operations and the operations that describe related resources (such as Amazon S3 buckets and Amazon EFS file systems). The policy also grants permissions for Amazon CloudWatch, including creating log groups and creating or updating a resource policy.

{ "Version": "2012-10-17", "Statement": [{ "Sid": "DataSyncFullAccessPermissions", "Effect": "Allow", "Action": [ "datasync:*", "ec2:CreateNetworkInterface", "ec2:CreateNetworkInterfacePermission", "ec2:DeleteNetworkInterface", "ec2:DescribeNetworkInterfaces", "ec2:DescribeRegions", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcEndpoints", "ec2:ModifyNetworkInterfaceAttribute", "fsx:DescribeFileSystems", "fsx:DescribeStorageVirtualMachines", "elasticfilesystem:DescribeAccessPoints", "elasticfilesystem:DescribeFileSystems", "elasticfilesystem:DescribeMountTargets", "iam:GetRole", "iam:ListRoles", "logs:CreateLogGroup", "logs:DescribeLogGroups", "logs:DescribeResourcePolicies", "outposts:ListOutposts", "s3:GetBucketLocation", "s3:ListAllMyBuckets", "s3:ListBucket", "s3:ListBucketVersions", "s3-outposts:ListAccessPoints", "s3-outposts:ListRegionalBuckets" ], "Resource": "*" }, { "Sid": "DataSyncPassRolePermissions", "Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "*", "Condition": { "StringEquals": { "iam:PassedToService": [ "datasync.amazonaws.com" ] } } }, { "Sid": "DataSyncCreateSLRPermissions", "Effect": "Allow", "Action": [ "iam:CreateServiceLinkedRole" ], "Resource": "arn:aws:iam::*:role/aws-service-role/datasync.amazonaws.com/AWSServiceRoleForDataSync", "Condition": { "StringEquals": { "iam:AWSServiceName": "datasync.amazonaws.com" } } } ] }

AWS managed policy: AWSDataSyncDiscoveryServiceRolePolicy

You can't attach the AWSDataSyncDiscoveryServiceRolePolicy policy to your IAM identities. This policy is attached to a service-linked role that allows DataSync to perform actions on your behalf. For more information, see Using service-linked roles for DataSync.

AWS managed policy: AWSDataSyncServiceRolePolicy

You can't attach the AWSDataSyncServiceRolePolicy policy to your IAM identities. This policy is attached to a service-linked role that allows DataSync to perform actions on your behalf. For more information, see Using service-linked roles for DataSync.

This policy grants administrative permissions that allow the service-linked role to create Amazon CloudWatch logs for DataSync tasks using Enhanced mode.

Policy updates

Change Description Date
AWSDataSyncServiceRolePolicy – New policy

DataSync added a policy that's used by the DataSync service-linked role AWSServiceRoleForDataSync. This new managed policy automatically creates Amazon CloudWatch logs for your DataSync tasks that use Enhanced mode.

October 30, 2024
AWSDataSyncFullAccess – Change

DataSync added new a permission to AWSDataSyncFullAccess:

  • iam:CreateServiceLinkedRole

This permission lets DataSync create service-linked roles for you.

October 30, 2024
AWSDataSyncFullAccess – Change

DataSync added new a permission to AWSDataSyncFullAccess:

  • ec2:DescribeRegions

This permission lets you choose opt-in Regions when creating a DataSync task for transfers between AWS Regions.

July 22, 2024
AWSDataSyncFullAccess – Change

DataSync added new a permission to AWSDataSyncFullAccess:

  • s3:ListBucketVersions

This permission lets you choose a specific version of your DataSync manifest.

February 16, 2024

AWSDataSyncFullAccess – Change

DataSync added new permissions to AWSDataSyncFullAccess:

  • ec2:DescribeVpcEndpoints

  • elasticfilesystem:DescribeAccessPoints

  • fsx:DescribeStorageVirtualMachines

  • outposts:ListOutposts

  • s3:GetBucketLocation

  • s3-outposts:ListAccessPoints

  • s3-outposts:ListRegionalBuckets

These permissions help you create DataSync agents and locations for Amazon EFS, Amazon FSx for NetApp ONTAP, Amazon S3, and S3 on Outposts.

May 2, 2023

DataSync started tracking changes

DataSync started tracking changes for its AWS managed policies.

March 1, 2021