AmazonInspector2FullAccess_v2
Description: Provides full access to Amazon Inspector and access to other related services such as organizations with restrictive organizational access.
AmazonInspector2FullAccess_v2
is an AWS managed policy.
Using this policy
You can attach AmazonInspector2FullAccess_v2
to your users, groups, and roles.
Policy details
-
Type: AWS managed policy
-
Creation time: July 03, 2025, 16:07 UTC
-
Edited time: July 03, 2025, 16:07 UTC
-
ARN:
arn:aws:iam::aws:policy/AmazonInspector2FullAccess_v2
Policy version
Policy version: v1 (default)
The policy's default version is the version that defines the permissions for the policy. When a user or role with the policy makes a request to access an AWS resource, AWS checks the default version of the policy to determine whether to allow the request.
JSON policy document
{ "Version" : "2012-10-17", "Statement" : [ { "Sid" : "AllowFullAccessToInspectorApis", "Effect" : "Allow", "Action" : "inspector2:*", "Resource" : "*" }, { "Sid" : "AllowAccessToCodeGuruApis", "Effect" : "Allow", "Action" : [ "codeguru-security:BatchGetFindings", "codeguru-security:GetAccountConfiguration" ], "Resource" : "*" }, { "Sid" : "AllowAccessToCreateSlr", "Effect" : "Allow", "Action" : "iam:CreateServiceLinkedRole", "Resource" : "*", "Condition" : { "StringEquals" : { "iam:AWSServiceName" : [ "agentless.inspector2.amazonaws.com", "inspector2.amazonaws.com" ] } } }, { "Sid" : "AllowServicePrincipalBasedAccessToOrganizationApis", "Effect" : "Allow", "Action" : [ "organizations:EnableAWSServiceAccess", "organizations:RegisterDelegatedAdministrator", "organizations:ListDelegatedAdministrators" ], "Resource" : "*", "Condition" : { "StringEquals" : { "organizations:ServicePrincipal" : [ "inspector2.amazonaws.com", "agentless.inspector2.amazonaws.com" ] } } }, { "Sid" : "AllowOrganizationalBasedAccessToOrganizationApis", "Effect" : "Allow", "Action" : [ "organizations:DescribeOrganizationalUnit" ], "Resource" : "arn:*:organizations::*:ou/o-*/ou-*" }, { "Sid" : "AllowAccountsBasedAccessToOrganizationApis", "Effect" : "Allow", "Action" : [ "organizations:DescribeAccount" ], "Resource" : "arn:*:organizations::*:account/o-*/*" }, { "Sid" : "AllowAccessToOrganizationApis", "Effect" : "Allow", "Action" : [ "organizations:ListAWSServiceAccessForOrganization", "organizations:DescribeOrganization" ], "Resource" : "*" } ] }