Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

AWS managed policies for AWS Systems Manager for SAP

Focus mode
AWS managed policies for AWS Systems Manager for SAP - AWS Systems Manager for SAP

To add permissions to users, groups, and roles, it is easier to use AWS managed policies than to write policies yourself. It takes time and expertise to create IAM customer managed policies that provide your team with only the permissions they need. To get started quickly, you can use our AWS managed policies. These policies cover common use cases and are available in your AWS account. For more information about AWS managed policies, see AWS managed policies in the IAM User Guide.

AWS services maintain and update AWS managed policies. You can't change the permissions in AWS managed policies. Services occasionally add additional permissions to an AWS managed policy to support new features. This type of update affects all identities (users, groups, and roles) where the policy is attached. Services are most likely to update an AWS managed policy when a new feature is launched or when new operations become available. Services do not remove permissions from an AWS managed policy, so policy updates won't break your existing permissions.

Additionally, AWS supports managed policies for job functions that span multiple services. For example, the ReadOnlyAccess AWS managed policy provides read-only access to all AWS services and resources. When a service launches a new feature, AWS adds read-only permissions for new operations and resources. For a list and descriptions of job function policies, see AWS managed policies for job functions in the IAM User Guide.

AWS managed policy: AWSSystemsManagerForSAPFullAccess

Attach the AWSSystemsManagerForSAPFullAccess policy to your IAM identities.

The AWSSystemsManagerForSAPFullAccess policy grants full access to Systems Manager for SAP service.

Permissions details

This policy includes the following permissions.

  • ssm-sap – Allows principals full access to Systems Manager for SAP.

  • iam – Allows a service-linked role to be created, which is a requirement for using Systems Manager for SAP.

  • ec2 – Allows Systems Manager for SAP to start or stop an Amazon EC2 instance, if that instance is tagged with the key value pair SSMForSAPManaged=True.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AwsSsmForSapPermissions", "Effect": "Allow", "Action": [ "ssm-sap:*" ], "Resource": "arn:*:ssm-sap:*:*:*" }, { "Sid": "AwsSsmForSapServiceRoleCreationPermission", "Effect": "Allow", "Action": [ "iam:CreateServiceLinkedRole" ], "Resource": [ "arn:aws:iam::*:role/aws-service-role/ssm-sap.amazonaws.com/AWSServiceRoleForAWSSSMForSAP" ], "Condition": { "StringEquals": { "iam:AWSServiceName": "ssm-sap.amazonaws.com" } } }, { "Sid": "Ec2StartStopPermission", "Effect": "Allow", "Action": [ "ec2:StartInstances", "ec2:StopInstances" ], "Resource": "arn:aws:ec2:*:*:instance/*", "Condition": { "StringEqualsIgnoreCase": { "ec2:resourceTag/SSMForSAPManaged": "True" } } } ] }

AWS managed policy: AWSSystemsManagerForSAPReadOnlyAccess

Attach the AWSSystemsManagerForSAPReadOnlyAccess policy to your IAM identities.

The AWSSystemsManagerForSAPReadOnlyAccess policy grants read only access to the Systems Manager for SAP service.

Permissions details

This policy includes the following permissions.

  • ssm-sap – Allows principals read only access to Systems Manager for SAP.

{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ssm-sap:get*", "ssm-sap:list*" ], "Resource": "arn:*:ssm-sap:*:*:*" } ] }

Systems Manager for SAP updates to AWS managed policies

View details about updates to AWS managed policies for Systems Manager for SAP since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Systems Manager for SAP Document history page.

Change Description Date

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Updated policy for managing application tags on Amazon EBS volumes.

September 05, 2024

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added ec2:CreateTags, ec2:DeleteTags, resource-groups:Tag, and resource-groups:CreateGroup actions to the policy.

These permissions enable you to create and delete tags on EC2 instances and volumes. These permissions also enable you to create, tag, and delete Systems Manager for SAP resource groups.

August 05, 2024

AWSSystemsManagerForSAPFullAccess – Updated policy

Added ec2:StartInstances and ec2:StopInstances actions to the policy.

These permissions enable you to start or stop an SAP application registered with Systems Manager for SAP.

July 10, 2024

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added ec2:StartInstances and ec2:StopInstances actions to the policy.

These permissions enable you to start or stop an SAP application registered with Systems Manager for SAP.

April 26, 2024

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added AWS Resource Group actions to the policy.

November 21, 2023

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added Systems Manager action to the policy.

November 17, 2023

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added Amazon EC2 and Systems Manager actions to the policy.

October 27, 2023

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added AWS Service Catalog and AWS Resource Group actions to the policy.

July 25, 2023

AWSSSMForSAPServiceLinkedRolePolicy – Updated policy

Added the PutMetricData Amazon CloudWatch action to the policy.

January 05, 2023

AWSSystemsManagerForSAPFullAccess – Updated policy

Updated the "arn:aws:iam::*:role/aws-service-role/ssm-sap.amazonaws.com/AWSServiceRoleForAWSSSMForSAP" resource in policy.

November 18, 2022

AWSSystemsManagerForSAPFullAccess – New policy made available at launch

AWSSystemsManagerForSAPFullAccess grants an IAM user account full access to Systems Manager for SAP service.

November 15, 2022

AWSSystemsManagerForSAPReadOnlyAccess – New policy made available at launch

AWSSystemsManagerForSAPReadOnlyAccess grants an IAM user account read only access to Systems Manager for SAP service.

November 15, 2022

AWSSSMForSAPServiceLinkedRolePolicy – New policy made available at launch

The AWSSSMForSAPServiceLinkedRolePolicy service-linked role policy provides access to Systems Manager for SAP.

November 15, 2022

Systems Manager for SAP started tracking changes

Systems Manager for SAP started tracking changes for its AWS managed policies.

November 15, 2022
PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.