Shareable AWS resources
With AWS Resource Access Manager (AWS RAM), you can share resources that are created and managed by other AWS services. You can share resources with individual AWS accounts. You can also share resources with the accounts in an organization or organizational units (OUs) in AWS Organizations. Some supported resource types also let you share resources with individual AWS Identity and Access Management (IAM) roles and users.
The following sections list the resource types, grouped by AWS service, that you can share by using AWS RAM. The columns in the tables specify which features each resource type supports:
Can share with IAM users and roles |
|
Can share with accounts outside its organization |
|
Can use customer managed permissions |
All resource types supported by AWS RAM support AWS managed permissions, but a Yes in this column means that customer managed permissions is also supported for this resource type.
|
Can share with service principals |
|
Amazon API Gateway
You can share the following Amazon API Gateway resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Domain name
|
Create and manage domain names centrally, and share them with other AWS accounts or your organization. This lets multiple accounts invoke your domain names that are mapped to private APIs. For more information, see Custom domain names for private APIs in API Gateway in the Amazon API Gateway Developer Guide. |
|
Can share with any AWS account. |
|
|
AWS App Mesh
You can share the following AWS App Mesh resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Mesh
|
Create and manage a mesh centrally, and share it with other AWS accounts or your organization. A shared mesh allows resources created by different AWS accounts to communicate with each other in the same mesh. For more information, see Working with shared meshes in the AWS App Mesh User Guide. |
|
Can share with any AWS account. |
|
|
AWS AppSync GraphQL API
You can share the following AWS AppSync GraphQL API resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
GraphyQL API
|
Manage AWS AppSync GraphQL APIs centrally, and share them with other AWS accounts or your organization. This lets multiple accounts share AWS AppSync APIs as part of creating a unified AWS AppSync Merged API which can access data from multiple subschema APIs across different accounts in the same Region. For more information, see Merged APIs in the AWS AppSync Developer Guide. |
|
Can share with any AWS account. |
|
|
Amazon Aurora
You can share the following Amazon Aurora resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
DB clusters
|
Create and manage a DB cluster centrally, and share it with other AWS accounts or your organization. This lets multiple AWS accounts clone a shared, centrally managed DB cluster. For more information, see Cross-account cloning with AWS RAM and Amazon Aurora in the Amazon Aurora User Guide. |
|
Can share with any AWS account. |
|
|
AWS Backup
You can share the following AWS Backup resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
BackupVault
|
Create and manage logically air-gapped vaults centrally and share them with other AWS accounts or your organization. This option lets multiple accounts access and restore backups from the vault(s). For more information, see Overview of logically air gapped vaults in the AWS Backup Developer Guide. |
|
Can share with any AWS account. |
|
|
Amazon Bedrock
You can share the following Amazon Bedrock resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Custom Model
|
Create and manage custom model centrally, and share it with other AWS accounts or your organization. This lets multiple accounts use the same custom model for generative AI applications. For more information, see Share a model for another account in the Amazon Bedrock User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
AWS Billing View Service
You can share the following AWS Billing View Service resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Billing View
|
Create and manage custom billing views centrally, and share them with other AWS accounts or your organization. This lets application and business unit owners access business unit-level AWS spend from a member account. For more information, see Controlling cost management data access with Billing View in the AWS Cost Management User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
AWS Private Certificate Authority
You can share the following AWS Private CA resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Private certificate authority (CA)
|
Create and manage private certificate authorities (CAs) for your organization’s internal public key infrastructure (PKI), and share those CAs with other AWS accounts or your organization. This lets AWS Certificate Manager users in other accounts issue X.509 certificates signed by your shared CA. For more information, see Controlling access to a private CA in the AWS Private Certificate Authority User Guide. |
|
Can share with any AWS account. |
|
|
Amazon DataZone
You can share the following DataZone resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
DataZone Domain
|
Create and manage domains centrally, and share it with other AWS accounts or your organization. This lets multiple accounts create Amazon DataZone domains. For more information, see What is Amazon DataZone in the Amazon DataZone User Guide. |
|
Can share with any AWS account. |
|
|
AWS CloudHSM
You can share the following AWS CloudHSM resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
AWS CloudHSM Backup
|
Manage AWS CloudHSM Backups centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts and users view information about the Backup and use it to restore a AWS CloudHSM Cluster. For more information, see Managing AWS CloudHSM backups in the AWS CloudHSM User Guide. |
|
|
|
|
AWS CodeBuild
You can share the following AWS CodeBuild resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Project
|
Create a project, and use it to run builds. Share the project with other AWS accounts or your organization. This lets multiple AWS accounts and users view information about a project and analyze its builds. For more information, see Working with shared projects in the AWS CodeBuild User Guide. |
|
Can share with any AWS account. |
|
|
Report group
|
Create a report group, and use it to create reports when you build a project. Share the report group with other AWS accounts or your organization. This lets multiple AWS accounts and users view the report group and its reports, and the test case results for each report. A report can be viewed for 30 days after it's created, and then it expires and is no longer available to view. For more information, see Working with shared projects in the AWS CodeBuild User Guide. |
|
Can share with any AWS account. |
|
|
Amazon EC2
You can share the following Amazon EC2 resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Capacity reservations
|
Create and manage capacity reservations centrally, and share the reserved capacity with other AWS accounts or your organization. This lets multiple AWS accounts launch their Amazon EC2 instances into centrally managed reserved capacity. For more information, see Working with shared Capacity Reservations in the Amazon EC2 User Guide. ImportantIf you don't meet all of the prerequisites for sharing a capacity reservation, then the sharing operation can fail. If this happens and a user attempts to launch an Amazon EC2 instance into that capacity reservation, it launches as an on-demand instance that can accrue higher costs. We recommend that you verify that you can access the shared capacity reservation by attempting to view it in the Amazon EC2 console. You can also monitor for failed resource shares so that you can take corrective action before users launch instances in ways that raise your costs. For more information, see Example: Alerting on resource share failures. |
|
Can share with any AWS account. |
|
|
Dedicated hosts
|
Allocate and manage Amazon EC2 dedicated hosts centrally, and share the host's instance capacity with other AWS accounts or your organization. This lets multiple AWS accounts launch their Amazon EC2 instances on to centrally managed dedicated hosts. For more information, see Working with shared Dedicated Hosts in the Amazon EC2 User Guide. |
|
Can share with any AWS account. |
|
|
Placement groups
|
Share the placement groups you own across your AWS accounts, both within and outside your organization. You can launch Amazon EC2 instances from any of the accounts you share with into a shared placement group. For more information, see, Share a placement group in the Amazon EC2 User Guide. |
|
Can share with any AWS account. |
|
|
EC2 Image Builder
You can share the following EC2 Image Builder resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Components
|
Create and manage components centrally, and share them with other AWS accounts or your organization. Manage who can use predefined build and test components in their image recipes. For more information, see Share EC2 Image Builder resources in the EC2 Image Builder User Guide. |
|
Can share with any AWS account. |
|
|
Container recipes
|
Create and manage your container recipes centrally, and share them with other AWS accounts or your organization. This allows you to manage who can use predefined documents to duplicate container image builds. For more information, see Share EC2 Image Builder resources in the EC2 Image Builder User Guide. |
|
Can share with any AWS account. |
|
|
Images
|
Create and manage your golden images centrally, and share them with other AWS accounts or your organization. Manage who can use images created with EC2 Image Builder across your organization. For more information, see Share EC2 Image Builder resources in the EC2 Image Builder User Guide. |
|
Can share with any AWS account. |
|
|
Image recipes
|
Create and manage your image recipes centrally, and share them with other AWS accounts or your organization. This allows you to manage who can use predefined documents to duplicate AMI builds. For more information, see Share EC2 Image Builder resources in the EC2 Image Builder User Guide. |
|
Can share with any AWS account. |
|
|
AWS End User Messaging SMS
You can share the following AWS End User Messaging SMS resource by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
OptOutList
|
Create an OptOutList and share it with other AWS accounts in your organization. You can share the OptOutList so the other applications can opt out user's phone numbers from different AWS accounts or they can check the status of the user's phone number. For more information, see Working with shared resources in the in AWS End User Messaging SMS User Guide. |
|
Can share with any AWS account. |
|
|
PhoneNumber
|
Create and manage phone number to share them with other AWS accounts or your organization. This lets multiple AWS accounts send messages using the shared phone number. For more information, see Working with shared resources in the in AWS End User Messaging SMS User Guide. |
|
Can share with any AWS account. |
|
|
Pool
|
Create and manage pools to share them with other AWS accounts or your organization. This lets multiple AWS accounts send messages using the shared pool. For more information, see Working with shared resources in the in AWS End User Messaging SMS User Guide. |
|
Can share with any AWS account. |
|
|
SenderId
|
Create and manage SenderId's and share them with other AWS accounts or your organization. This lets multiple AWS accounts send messages using the shared SenderId. For more information, see Working with shared resources in the in AWS End User Messaging SMS User Guide. |
|
Can share with any AWS account. |
|
|
Amazon FSx for OpenZFS
You can share the following Amazon FSx for OpenZFS resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
FSx Volume
|
Create and manage FSx for OpenZFS volumes centrally, and share them
with other AWS accounts or your organization. This lets multiple
accounts perform data replication using OpenZfs snapshots under
shared volumes through FSx APIs |
|
Can share with any AWS account. |
|
|
AWS Glue
You can share the following AWS Glue resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Data catalogs
|
Manage a central data catalog, and share metadata about databases and tables with AWS accounts or your organization. This enables users to run queries on data across multiple accounts. For more information, see Sharing Data Catalog Tables and Databases Across AWS Accounts in the AWS Lake Formation Developer Guide. |
|
Can share with any AWS account. |
|
|
Databases
|
Create and manage data catalog databases centrally, and share them with AWS accounts or your organization. Databases are collections of data catalog tables. This enables users to run queries and extract, transform, and load (ETL) jobs that can join and query data across multiple accounts. For more information, see Sharing Data Catalog Tables and Databases Across AWS Accounts in the AWS Lake Formation Developer Guide. |
|
Can share with any AWS account. |
|
|
Tables
|
Create and manage data catalog tables centrally, and share them with AWS accounts or your organization. Data catalog tables contain metadata about data tables in Amazon S3, JDBC data sources, Amazon Redshift, streaming sources, and other data stores. This enables users to run queries and ETL jobs that can join and query data across multiple accounts. For more information, see Sharing Data Catalog Tables and Databases Across AWS Accounts in the AWS Lake Formation Developer Guide. |
|
Can share with any AWS account. |
|
|
AWS License Manager
You can share the following AWS License Manager resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
License configurations
|
Create and manage license configurations centrally, and share them with other AWS accounts or your organization. This lets you enforce centrally managed licensing rules that are based on the terms of your enterprise agreements across multiple AWS accounts. For more information, see License configurations in License Manager in the License Manager User Guide. |
|
Can share with any AWS account. |
|
|
AWS Marketplace
You can share the following AWS Marketplace resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Marketplace Catalog Entity
|
Create, manage, and share entities across AWS accounts or in your organization in AWS Marketplace. For more information, see Resource sharing in AWS RAM in the AWS Marketplace Catalog API Reference. |
|
Can share with any AWS account. |
|
|
AWS Migration Hub Refactor Spaces
You can share the following AWS Migration Hub Refactor Spaces resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Refactor Spaces Environment
|
Create a Refactor Spaces environment, and use it to contain your Refactor Spaces applications. Share the environment with other AWS accounts or all of the accounts in your organization. This lets multiple AWS accounts and users view information about the environment and the applications in it. For more information, see Sharing Refactor Spaces environments using AWS RAM in the AWS Migration Hub Refactor Spaces User Guide. |
|
Can share with any AWS account. |
|
|
AWS Network Firewall
You can share the following AWS Network Firewall resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Firewall policies
|
Create and manage firewall policies centrally, and share them with other AWS accounts or your organization. This enables multiple accounts in an organization to share a common set of network monitoring, protection, and filtering behaviors. For more information, see Sharing firewall policies and rule groups in the AWS Network Firewall Developer Guide. |
|
Can share with any AWS account. |
|
|
Rule groups
|
Create and manage stateless and stateful rule groups centrally, and share them with other AWS accounts or your organization. This enables multiple accounts in an organization in AWS Organizations to share a set of criteria for inspecting and handling network traffic. For more information, see Sharing firewall policies and rule groups in the AWS Network Firewall Developer Guide. |
|
Can share with any AWS account. |
|
|
AWS Outposts
You can share the following AWS Outposts resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Outposts
|
Create and manage Outposts centrally, and share them with other AWS accounts in your organization. This lets multiple accounts create subnets and EBS volumes on your shared, centrally managed Outposts. For more information, see Working with shared AWS Outposts resources in the AWS Outposts User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
Local gateway route table
|
Create and manage VPC associations to a local gateway centrally, and share them with other AWS accounts in your organization. This lets multiple accounts create VPC associations to a local gateway, and view route table and virtual interface configuration. For more information, see Shareable Outpost resources in the AWS Outposts User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
Sites
|
Create and manage Outpost sites and share them with other AWS accounts in your organization. This lets multiple accounts create and manage Outposts at the shared site and supports split control between the Outpost resources and the site. For more information, see Working with shared AWS Outposts resources in the AWS Outposts User Guide. |
|
Can share with any AWS account. |
|
|
Amazon S3 on Outposts
You can share the following Amazon S3 on Outposts resource by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
S3 on Outpost
|
Create and manage Amazon S3 buckets, access points, and endpoints on the Outpost. This lets multiple accounts create and manage Outposts at the shared site and supports split control between the Outpost resources and the site. For more information, see Working with shared AWS Outposts resources in the AWS Outposts User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
AWS Resource Explorer
You can share the following AWS Resource Explorer resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Views
|
Create and configure Resource Explorer views centrally, and share them with other AWS accounts in your organization. This lets roles and users in multiple AWS accounts search for and discover the resources accessible through the view. For more information, see Sharing Resource Explorer views in the AWS Resource Explorer User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
AWS Resource Groups
You can share the following AWS Resource Groups resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Resource groups
|
Create and manage a host resource group centrally, and share it with other AWS accounts in your organization. This lets multiple AWS accounts share a group of Amazon EC2 Dedicated Hosts created using AWS License Manager. For more information, see Host resource groups in AWS License Manager in the AWS License Manager User Guide. |
|
Can share with any AWS account. |
|
|
Amazon Route 53
You can share the following Amazon Route 53 resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Route 53 Resolver DNS Firewall rule groups
|
Create and manage Route 53 Resolver DNS Firewall rule groups centrally, and share them with other AWS accounts or your organization. This enables multiple accounts to share a set of criteria for inspecting and handling outbound DNS queries that go through Route 53 Resolver. For more information, see Sharing Route 53 Resolver DNS Firewall rule groups between AWS accounts in the Amazon Route 53 Developer Guide. |
|
Can share with any AWS account. |
|
|
Route 53 Profiles
|
Create and manage Route 53 Profiles centrally, and share them with other AWS accounts or your organization. This lets multiple accounts apply the DNS configurations specified in the Route 53 Profiles to multiple VPCs. For more information, see Amazon Route 53 Profiles in the Amazon Route 53 Developer Guide. |
|
Can share with any AWS account. |
|
|
Resolver rules
|
Create and manage Resolver rules centrally, and share them with other AWS accounts or your organization. This lets multiple accounts forward DNS queries from their virtual private clouds (VPCs) to the target IP addresses defined in shared, centrally managed Resolver rules. For more information, see Sharing Resolver rules with other AWS accounts and using shared rules in the Amazon Route 53 Developer Guide. |
|
Can share with any AWS account. |
|
|
Query logs
|
Create and manage query logs centrally, and share them with other AWS accounts or your organization. This enables multiple AWS accounts to log DNS queries that originate in their VPCs to a centrally managed query log. For more information, see Sharing Resolver query logging configurations with other AWS accounts in the Amazon Route 53 Developer Guide. |
|
Can share with any AWS account. |
|
|
Amazon Application Recovery Controller (ARC)
You can share the following Amazon Application Recovery Controller (ARC) resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
ARC cluster
|
Create and manage ARC clusters centrally, and share them with other AWS accounts or your organization. This lets multiple accounts create control panels and routing controls in a single shared cluster, reducing complexity and the total number of clusters an organization requires. For more information, see Sharing clusters across accounts in the Amazon Application Recovery Controller (ARC) Developer Guide. |
|
Can share with any AWS account. |
|
|
Amazon Simple Storage Service
You can share the following Amazon Simple Storage Service resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Access Grants
|
Create and manage S3 Access Grants Instance centrally, and share them with other AWS accounts or your organization. This lets multiple accounts view and delete shared resources. For more information, see S3 Access Grants Cross-account Access in the Amazon Simple Storage Service User Guide. |
|
Can share with any AWS account. |
|
|
Amazon SageMaker AI
You can share the following Amazon SageMaker AI resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
SageMaker AI Catalog
|
For discoverability – allows account owners to grant discoverability permissions to other accounts, for all feature group resources in the SageMaker AI catalog. Once granted access, users of those accounts can view the feature groups that have been shared with them from the catalog. For more information, see Cross-account feature group discoverability and access in the Amazon SageMaker AI Developer Guide. NoteDiscoverability and access are separate permissions in SageMaker AI. |
|
Can share with any AWS account. |
|
|
SageMaker AI Feature group
|
For access – allows account owners to grant access permissions to other accounts, for select feature group resources. Once granted access, users of those accounts can use the feature groups that have been shared with them. For more information, see Cross-account feature group discoverability and access in the Amazon SageMaker AI Developer Guide. NoteDiscoverability and access are separate permissions in SageMaker AI. |
|
Can share with any AWS account. |
|
|
SageMaker AI JumpStart
|
With Amazon SageMaker AI JumpStart, you can create and manage
|
|
Can share with any AWS account. |
|
|
Lineage group
|
Amazon SageMaker AI lets you create lineage groups of your pipeline metadata to get a deeper understanding of its history and relationships. Share the lineage group with other AWS accounts or the accounts in your organization. This lets multiple AWS accounts and users view information about the lineage group and query the tracking entities within it. For more information, see Cross-Account Lineage Tracking in the Amazon SageMaker AI Developer Guide. |
|
Can share with any AWS account. |
|
|
SageMaker AI Model Cards
|
Amazon SageMaker AI creates Model Cards to document critical details about your machine learning (ML) models in a single place for streamlined governance and reporting. Share your Model Cards with other AWS accounts or the accounts in your organization to achieve a multi-account strategy for your machine learning operations. This allows AWS accounts to share the model cards access for their ML activities to other accounts. For more information, see Amazon SageMaker AI Model Cards in the Amazon SageMaker AI Developer Guide. |
|
Can share with any AWS account. |
|
|
SageMaker AI Model Registry Model Package Group
|
With Amazon SageMaker AI Model Registry, you can create and manage
|
|
|
|
|
SageMaker AI pipeline
|
With Amazon SageMaker AI Model Building Pipelines, you can create, automate, and manage end-to-end machine learning workflows at scale. Share your pipelines with other AWS accounts or the accounts in your organization to achieve a multi-account strategy for your machine learning operations. This lets multiple AWS accounts and users view information about a pipeline and its executions with optional access to start, stop, and retry pipelines from other accounts. For more information, see Cross-Account Support for SageMaker AI Pipelines in the Amazon SageMaker AI Developer Guide. |
|
Can share with any AWS account. |
|
|
AWS Service Catalog AppRegistry
You can share the following AWS Service Catalog AppRegistry resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Application
|
Create an application, and use it to track the resources belonging to that application throughout your AWS environment. Share the application with other AWS accounts or your organization. This lets multiple AWS accounts and users view information about the application and associated resources with it locally. For more information, see Creating applications in the Service Catalog User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
Attribute Group
|
Create an attribute group, and use it to store meta-data relating to your applications. Share the attribute groups with other AWS accounts or your organization. This lets multiple AWS accounts and users view information about the attribute groups. For more information, see Creating attribute groups in the Service Catalog User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
AWS Systems Manager Incident Manager
You can share the following AWS Systems Manager Incident Manager resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Contacts
|
Create and manage contacts and escalation plans centrally, and share the contact details with other AWS accounts or your organization. This lets many AWS accounts view engagements occurring during an incident. For more information, see Working with shared contacts and response plans in the AWS Systems Manager Incident Manager User Guide. |
|
Can share with any AWS account. |
|
|
Response plans
|
Create and manage response plans centrally, and share them with other AWS accounts or your organization. This lets those AWS accounts connect Amazon CloudWatch alarms and Amazon EventBridge event rules to response plans, automatically creating an incident when it’s detected. The incident also has access to the metrics of these other AWS accounts. For more information, see Working with shared contacts and response plans in the AWS Systems Manager Incident Manager User Guide. |
|
Can share with any AWS account. |
|
|
AWS Systems Manager Parameter Store
You can share the following AWS Systems Manager Parameter Store resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Parameter
|
Create a parameter, and use it to store configuration data that you can reference in your scripts, commands, SSM documents, and configuration and automation workflows. Share the parameter with other AWS accounts or your organization. This lets multiple AWS accounts and users view information about the string and improve security by separating your data from your code. For more information, see Working with shared parameters in the AWS Systems Manager User Guide. |
|
Can share with any AWS account. |
|
|
Amazon VPC
You can share the following Amazon Virtual Private Cloud (Amazon VPC) resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Customer-owned IPv4 addresses
|
During the AWS Outposts installation process, AWS creates an address pool, known as a customer-owned IP address pool, based on information that you provide about your on-premises network. Customer-owned IP addresses provide local, or external connectivity to resources in your Outposts subnets through your on-premises network. You can assign these addresses to resources on your Outpost, such as EC2 instances, using Elastic IP addresses or using the subnet setting that automatically assigns customer-owned IP addresses. For more information, see Customer-owned IP addresses in the AWS Outposts User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
IP Address Manager (IPAM) pools
|
Share Amazon VPC IPAM pools centrally with other AWS accounts, IAM roles or users, or an entire organization or organizational unit (OU) in AWS Organizations. This lets those principals allocate CIDRs from the pool to AWS resources, such as VPCs, in their respective accounts. For more information, see Share an IPAM pool using AWS RAM in the Amazon VPC IP Address Manager User Guide. |
|
Can share with any AWS account. |
|
|
IP Address Manager (IPAM) resource discoveries
|
Share resource discoveries with other AWS accounts. A resource discovery is an Amazon VPC IPAM component that enables IPAM to manage and monitor resources that belong to the owning account. For more information, see Work with resource discoveries in the Amazon VPC IPAM User Guide. |
|
Can share with any AWS account. |
|
|
Prefix lists
|
Create and manage prefix lists centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts reference prefix lists in their resources, such as VPC security groups and subnet route tables. For more information, see Working with shared prefix lists in the Amazon VPC User Guide. |
|
Can share with any AWS account. |
|
|
Subnets
|
Create and manage subnets centrally, and share them with AWS accounts within your organization. This lets multiple AWS accounts launch their application resources into centrally managed VPCs. These resources include Amazon EC2 instances, Amazon Relational Database Service (RDS) databases, Amazon Redshift clusters, and AWS Lambda functions. For more information, see Working with VPC sharing in the Amazon VPC User Guide. NoteTo include a subnet when you create a resource share, you must
have the Default subnets are not shareable. You can share only subnets you create yourself. |
|
Can share with only AWS accounts in its own organization. |
|
|
Security groups
|
Create and manage security groups centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts associate the security group with their Elastic network interfaces. For more information, see Share a security group in the Amazon VPC User Guide. |
|
Can share with only AWS accounts in its own organization. |
|
|
Traffic mirror targets
|
Create and manage traffic mirror targets centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts send mirrored network traffic from traffic mirror sources in their accounts to a shared, centrally managed traffic mirror target. For more information, see Cross-account traffic mirroring targets in the Traffic Mirroring Guide. |
|
Can share with any AWS account. |
|
|
Transit gateways
|
Create and manage transit gateways centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts route traffic between their VPCs and on-premises networks through a shared, centrally managed transit gateway. For more information, see Sharing a transit gateway in the Amazon VPC Transit Gateways. NoteTo include a transit gateway when you create a resource share,
you must have the |
|
Can share with any AWS account. |
|
|
Transit gateway multicast domains
|
Create and manage transit gateway multicast domains centrally, and share them with other AWS accounts or your organization. This lets multiple AWS accounts register and deregister group members or group sources in the multicast domain. For more information, see Working with shared multicast domains in the Transit Gateways Guide. |
|
Can share with any AWS account. |
|
|
AWS Verified Access group
|
Create and manage AWS Verified Access groups centrally, and then share them with other AWS accounts or your organization. This lets applications in multiple accounts use a single, shared set of AWS Verified Access endpoints. For more information, see Share your AWS Verified Access group through AWS Resource Access Manager in the AWS Verified Access User Guide. |
|
Can share with any AWS account. |
|
|
Amazon VPC Lattice
You can share the following Amazon VPC Lattice resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Amazon VPC Lattice service
|
Create and manage Amazon VPC Lattice services centrally, and share them with individual AWS accounts or your organization. This allows service owners to connect, secure, and observe service-to-service communication in a multi-account environment. For more information, see Working with shared resources in the VPC Lattice User Guide. |
|
Can share with any AWS account. |
|
|
Amazon VPC Lattice service network
|
Create and manage Amazon VPC Lattice service networks centrally, and share them with individual AWS accounts or your organization. This allows service network owners to connect, secure, and observe service-to-service communication in a multi-account environment. For more information, see Working with shared resources in the Amazon VPC Lattice User Guide. |
|
Can share with any AWS account. |
|
|
AWS Cloud WAN
You can share the following AWS Cloud WAN resources by using AWS RAM.
Resource type and code | Use case | Can share with IAM users and roles | Can share with accounts outside its organization | Can use customer managed permissions | Can share with service principals |
---|---|---|---|---|---|
Cloud WAN core network
|
Create and manage a Cloud WAN core network centrally, and share it with other AWS accounts. This lets multiple AWS accounts access and provision hosts on a single Cloud WAN core network. For more information, see Share a core network in the AWS Cloud WAN User Guide. |
|
Can share with any AWS account. |
|
|