IAM actions and resources migration
AWS Security Agent is a frontier agent that proactively secures your applications throughout the development lifecycle across all your environments. If you onboarded to AWS Security Agent prior to February 9, 2026, you will be impacted by upcoming changes on March 9, 2026 to your existing Agent Instance resources and AWS Security Agent IAM actions. In preparation for releasing public API/SDK support, the Agent Instance resource is being renamed to Agent Space, and specific IAM actions are being renamed. These changes will affect any Application or Agent Instances IAM roles you have created prior to March 9, 2026. In order to avoid seeing authentication issues after March 9, 2026, you will need to follow the steps under Preparing for Migration.
Note
If you create any new Agent Instances after February 9, 2026, the new Agent Instance will be created as an Agent Space and no migration steps will be required.
Planned Changes
AWS Security Agent is renaming the Agent Instance resource to Agent Space: arn:aws:securityagent:us-east-1:{{accountId}}:agent-instance/* renamed to arn:aws:securityagent:us-east-1:{{accountId}}:agent-space/*. Additionally, the following IAM actions are being renamed:
-
securityagent:ListAgentInstancesrenamed tosecurityagent:ListAgentSpaces -
securityagent:ListControlsrenamed tosecurityagent:ListSecurityRequirements -
securityagent:BatchGetAgentInstancesrenamed tosecurityagent:BatchGetAgentSpaces -
securityagent:BatchGetSecurityTestContentMetadatarenamed tosecurityagent:BatchGetPentestJobContentMetadata -
securityagent:BatchGetTasksrenamed tosecurityagent:BatchGetPentestJobTasks -
securityagent:CreateDocumentReviewrenamed tosecurityagent:CreateDesignReview -
securityagent:GetDocumentReviewrenamed tosecurityagent:GetDesignReview -
securityagent:GetDocumentReviewArtifactrenamed tosecurityagent:GetDesignReviewArtifact -
securityagent:ListDocumentReviewsrenamed tosecurityagent:ListDesignReviews -
securityagent:ListDocumentReviewCommentsrenamed tosecurityagent:ListDesignReviewComments -
securityagent:ListTasksrenamed tosecurityagent:ListPentestJobTasks -
securityagent:StartPentestExecutionrenamed tosecurityagent:StartPentestJob -
securityagent:StopPentestExecutionrenamed tosecurityagent:StopPentestJob -
securityagent:DeleteDocumentReviewrenamed tosecurityagent:DeleteDesignReview
Preparing for Migration
In order to avoid seeing issues after March 9, 2026 while continuing to use AWS Security Agent prior to March 9, 2026, you will need to trust both the new and old resources and IAM actions in your IAM roles/policies until March 9, 2026. The below instructions will provide a guide for migrating to the new resource and action formats:
-
Log in to your AWS account and navigate to the AWS Security Agent console
-
In the left hand panel, select Settings and click the role under Service role
-
In the IAM console for the associated role, select Add permissions and Attach policies
-
Select AWSSecurityAgentWebAppPolicy and click Add permissions
-
Important Note: Verify that you have selected AWSSecurityAgentWebAppPolicy as the new policy and not SecurityAgentWebAppAPIPolicy
-
-
Verify that your IAM role now has both AWSSecurityAgentWebAppPolicy and SecurityAgentWebAppAPIPolicy under Permissions policies
-
In the same IAM role console, select Trust relationships then Edit trust policy
-
Update your trust policy to the following format, replacing {{accountId}} with your AWS account ID
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "securityagent.amazonaws.com" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:SourceAccount": "{{accountId}}" }, "ArnLike": { "aws:SourceArn": [ "arn:aws:securityagent:us-east-1:{{accountId}}:application/*", "arn:aws:securityagent:us-east-1:{{accountId}}:agent-space/*", "arn:aws:securityagent:us-east-1:{{accountId}}:agent-instance/*" ] } } }, { "Effect": "Allow", "Principal": { "Service": "securityagent.amazonaws.com" }, "Action": "sts:SetContext", "Condition": { "StringEquals": { "aws:SourceAccount": "{{accountId}}" }, "ForAllValues:ArnEquals": { "sts:RequestContextProviders": "arn:aws:iam::aws:contextProvider/IdentityCenter" }, "ArnLike": { "aws:SourceArn": [ "arn:aws:securityagent:us-east-1:{{accountId}}:application/*", "arn:aws:securityagent:us-east-1:{{accountId}}:agent-space/*", "arn:aws:securityagent:us-east-1:{{accountId}}:agent-instance/*" ] } } } ] }
-
Navigate back to the AWS Security Agent console. From the left-hand panel, select Agent Spaces
-
For each Agent Space you have with penetration testing enabled, perform the following steps
-
Navigate to the Agent Space and select Penetration test
-
Scroll down to Service access and click the role under Service role name
-
In the IAM console for the associated role, select Trust relationships then Edit trust policy
-
Update your trust policy to the following format, replacing {{accountId}} with your AWS account ID
-
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "securityagent.amazonaws.com" }, "Action": "sts:AssumeRole", "Condition": { "StringEquals": { "aws:SourceAccount": "{{accountId}}" }, "ArnLike": { "aws:SourceArn": [ "arn:aws:securityagent:us-east-1:{{accountId}}:agent-space/*", "arn:aws:securityagent:us-east-1:{{accountId}}:agent-instance/*" ] } } } ] }