AWS managed policies for Amazon Aurora DSQL
An AWS managed policy is a standalone policy that is created and administered by AWS. AWS managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.
Keep in mind that AWS managed policies might not grant least-privilege permissions for your specific use cases because they're available for all AWS customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.
You cannot change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. AWS is most likely to update an AWS managed policy when a new AWS service is launched or new API operations become available for existing services.
For more information, see AWS managed policies in the IAM User Guide.
AWS managed policy: AmazonAuroraDSQLFullAccess
You can attach AmazonAuroraDSQLFullAccess
to your users, groups, and roles.
This policy grants permissions that allows full administrative access to Aurora DSQL. Principals with these permissions can:
-
Create, delete, and update Aurora DSQL clusters, including multi-Region clusters
-
Add and remove tags from clusters
-
List clusters and view information about individual clusters
-
See tags attached to Aurora DSQL clusters
-
Connect to the database as any user, including admin
-
Perform backup and restore operations for Aurora DSQL clusters, including starting, stopping, and monitoring backup and restore jobs
-
Use customer-managed AWS KMS keys for cluster encryption
-
View any metrics from CloudWatch their account account
-
Use AWS Fault Injection Service (AWS FIS) to inject failures into Aurora DSQL clusters for fault tolerance testing
-
Create service-linked roles for the
dsql.amazonaws.com
service, which is required for creating clusters
Permissions details
This policy includes the following permissions.
-
dsql
—grants principals full access to Aurora DSQL. -
cloudwatch
—grants permission to publish metric data points to Amazon CloudWatch. -
iam
—grants permission to create a service-linked role. -
backup and restore
—grants permissions to start, stop, and monitor backup and restore jobs for Aurora DSQL clusters. -
kms
—grants permissions required to validate access to customer-managed keys used for Aurora DSQL cluster encryption when creating, updating, or connecting to clusters. -
fis
—grants permissions to use AWS Fault Injection Service (AWS FIS) to inject failures into Aurora DSQL clusters for fault tolerance testing.
You can find the AmazonAuroraDSQLFullAccess
policy in the IAM console and
in the AWS Managed
Policy Reference Guide.
AWS managed policy: AmazonAuroraDSQLReadOnlyAccess
You can attach AmazonAuroraDSQLReadOnlyAccess
to your users, groups, and roles.
Allows read access to Aurora DSQL. Principals with these permissions can list clusters and view information about individual clusters. They can see the tags attached to Aurora DSQL clusters. They can retrieve and see any metrics from CloudWatch on your account.
Permissions details
This policy includes the following permissions.
-
dsql
– grants read only permissions to all resources in Aurora DSQL. -
cloudwatch
– grants permission to retrieve batch amounts of CloudWatch metric data and perform metric math on retrieved data
You can find the AmazonAuroraDSQLReadOnlyAccess
policy in the IAM console
and the AWS
Managed Policy Reference Guide.
AWS managed policy: AmazonAuroraDSQLConsoleFullAccess
You can attach AmazonAuroraDSQLConsoleFullAccess
to your users, groups, and roles.
Allows full administrative access to Amazon Aurora DSQL via the AWS Management Console. Principals with these permissions can:
-
Create, delete, and update Aurora DSQL clusters, including multi-Region clusters, with the console
-
List clusters and view information about individual clusters
-
See tags on any resource on your account
-
Connect to the database as any user, including the admin
-
Perform backup and restore operations for Aurora DSQL clusters, including starting, stopping, and monitoring backup and restore jobs
-
Use customer-managed AWS KMS keys for cluster encryption
-
Launch AWS CloudShell from the AWS Management Console
-
View any metrics from CloudWatch on your account
-
Use AWS Fault Injection Service (AWS FIS) to inject failures into Aurora DSQL clusters for fault tolerance testing
-
Create service linked roles for the
dsql.amazonaws.com
service, which is required for creating clusters
Permissions details
This policy includes the following permissions.
-
dsql
—grants full administrative permissions to all resources in Aurora DSQL via the AWS Management Console. -
cloudwatch
—grants permission to retrieve batch amounts of CloudWatch metric data and perform metric math on retrieved data. -
tag
—grants permission to returns tag keys and values currently in use in the specified AWS Region for the calling account. -
backup and restore
—grants permissions to start, stop, and monitor backup and restore jobs for Aurora DSQL clusters. -
kms
—grants permissions required to validate access to customer-managed keys used for Aurora DSQL cluster encryption when creating, updating, or connecting to clusters. -
cloudshell
—grants permissions to launch AWS CloudShell to interact with Aurora DSQL. -
ec2
—grants permission to view Amazon VPC endpoint information needed for Aurora DSQL connections. -
fis
—grants permissions to use AWS Fault Injection Service (AWS FIS) to inject failures into Aurora DSQL clusters for fault tolerance testing.
You can find the AmazonAuroraDSQLConsoleFullAccess
policy in the IAM
console and the AWS Managed Policy Reference Guide.
AWS managed policy: AuroraDSQLServiceRolePolicy
You can't attach AuroraDSQLServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role that allows Aurora DSQL to access account resources.
You can find the AuroraDSQLServiceRolePolicy
policy on the IAM console and AuroraDSQLServiceRolePolicy
in the AWS Managed Policy Reference Guide.
Aurora DSQL updates to AWS managed policies
View details about updates to AWS managed policies for Aurora DSQL since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Aurora DSQL Document history page.
Change | Description | Date |
---|---|---|
AmazonAuroraDSQLFullAccess and AmazonAuroraDSQLConsoleFullAccess update |
Added support for AWS Fault Injection Service (AWS FIS) integration with Aurora DSQL. This allows you to inject failures into single-Region and multi-Region Aurora DSQL clusters to test fault tolerance of your applications. You can create experiment templates in the AWS FIS console to define failure scenarios and target specific Aurora DSQL clusters for testing. For more on these policies, see AmazonAuroraDSQLFullAccess and AmazonAuroraDSQLConsoleFullAccess. |
August 19, 2025 |
AmazonAuroraDSQLFullAccess update |
Adds the capability to perform backup and restore operations for Aurora DSQL clusters, including starting, stopping, and monitoring jobs. It also adds the capability to use customer-managed KMS keys for cluster encryption. For more information, see AmazonAuroraDSQLFullAccess and Using service-linked roles in Aurora DSQL . |
May 21, 2025 |
AmazonAuroraDSQLConsoleFullAccess update |
Adds the capability to perform backup and restore operations for Aurora DSQL clusters through the AWS Console Home. This includes starting, stopping, and monitoring jobs. It also supports using customer-managed KMS keys for cluster encryption and launching AWS CloudShell. For more information, see AmazonAuroraDSQLConsoleFullAccess and Using service-linked roles in Aurora DSQL . |
May 21, 2025 |
AmazonAuroraDSQLFullAccess update |
The policy adds four new permissions to create and manage database
clusters across multiple AWS Regions:
The policy also adds the For more information, see For more information, see AmazonAuroraDSQLFullAccess and Using service-linked roles in Aurora DSQL . |
May 13, 2025 |
AmazonAuroraDSQLReadOnlyAccess update | Includes the ability to determine the correct VPC endpoint service name
when connecting to your Aurora DSQL clusters through AWS PrivateLink Aurora DSQL creates
unique endpoints per cell, so this API helps ensure you can identify the
correct endpoint for your cluster and avoid connection errors. For more information, see AmazonAuroraDSQLReadOnlyAccess and Using service-linked roles in Aurora DSQL . |
May 13, 2025 |
AmazonAuroraDSQLConsoleFullAccess update | Adds new permissions to Aurora DSQL to support multi-Region cluster management
and VPC endpoint connection. The new permissions include:
PutMultiRegionProperties
PutWitnessRegion
AddPeerCluster
RemovePeerCluster
GetVpcEndpointServiceName
For more information, see AmazonAuroraDSQLConsoleFullAccess and Using service-linked roles in Aurora DSQL . |
May 13, 2025 |
AuroraDsqlServiceLinkedRolePolicy update | Adds the ability to publish metrics to the AWS/AuroraDSQL and
AWS/Usage CloudWatch namespaces to the policy. This allows the
associated service or role to emit more comprehensive usage and performance
data to your CloudWatch environment. For more information, see AuroraDsqlServiceLinkedRolePolicy and Using service-linked roles in Aurora DSQL. |
May 8, 2025 |
Page created | Started tracking AWS managed policies related to Amazon Aurora DSQL | December 3, 2024 |