Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Service-linked role permissions for MediaTailor

Focus mode
Service-linked role permissions for MediaTailor - AWS Elemental MediaTailor

MediaTailor uses the service-linked role named AWSServiceRoleForMediaTailor – MediaTailor uses this service-linked role to invoke CloudWatch to create and manage log groups, log streams, and log events. This service-linked role is attached to the following managed policy: AWSMediaTailorServiceRolePolicy.

The AWSServiceRoleForMediaTailor service-linked role trusts the following services to assume the role:

  • mediatailor.amazonaws.com

The role permissions policy allows MediaTailor to complete the following actions on the specified resources:

  • Action: logs:PutLogEvents on arn:aws:logs:*:*:log-group:/aws/MediaTailor/*:log-stream:*

  • Action: logs:CreateLogStream, logs:CreateLogGroup, logs:DescribeLogGroups, logs:DescribeLogStreams on arn:aws:logs:*:*:log-group:/aws/MediaTailor/*

You must configure permissions to allow an IAM entity (such as a user, group, or role) to create, edit, or delete a service-linked role. For more information, see Service-Linked Role Permissions in the IAM User Guide.

PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.