View a markdown version of this page

Execution role permissions for scheduled reports - AWS Cost Management

Execution role permissions for scheduled reports

When you create a scheduled report, you must provide an IAM execution role that grants AWS Billing and Cost Management permissions to generate and deliver reports on your behalf. The execution role requires the following permissions and trust policy.

Permissions policy

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AwsBcmDashboardsScheduleReportsDataAccess", "Effect": "Allow", "Action": [ "bcm-dashboards:GetDashboard" ], "Resource": [ "arn:aws:bcm-dashboards::*:dashboard/*" ] }, { "Sid": "AwsBcmDashboardsScheduleReportsDataAccessCE", "Effect": "Allow", "Action": [ "ce:GetDimensionValues", "ce:GetCostAndUsageWithResources", "ce:GetCostAndUsage", "ce:GetCostForecast", "ce:GetTags", "ce:GetUsageForecast", "ce:GetCostCategories", "ce:GetSavingsPlansCoverage", "ce:GetReservationUtilization", "ce:GetReservationCoverage", "ce:GetSavingsPlansUtilization", "ce:GetSavingsPlansUtilizationDetails" ], "Resource": "*" } ] }

Trust policy

The execution role must trust the bcm-dashboards.amazonaws.com service principal. Replace <account-id> with your AWS account ID.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AllowBcmDashboardScheduledReportAssumeRole", "Effect": "Allow", "Principal": { "Service": "bcm-dashboards.amazonaws.com" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:SourceAccount": "<account-id>" }, "StringLike": { "aws:SourceArn": "arn:aws:bcm-dashboards::<account-id>:*" } } } ] }