AWS managed policies for Security Hub - AWS Security Hub

AWS managed policies for Security Hub

An AWS managed policy is a standalone policy that is created and administered by AWS. AWS managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.

Keep in mind that AWS managed policies might not grant least-privilege permissions for your specific use cases because they're available for all AWS customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.

You cannot change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. AWS is most likely to update an AWS managed policy when a new AWS service is launched or new API operations become available for existing services.

For more information, see AWS managed policies in the IAM User Guide.

AWS managed policy: AWSSecurityHubFullAccess

You can attach the AWSSecurityHubFullAccess policy to your IAM identities.

This policy grants administrative permissions that allow a principal full access to all Security Hub CSPM actions. This policy must be attached to a principal before they enable Security Hub CSPM manually for their account. For example, principals with these permissions can both view and update the status of findings. They can configure custom insights, and enable integrations. They can enable and disable standards and controls. Principals for an administrator account can also manage member accounts.

Permissions details

This policy includes the following permissions.

  • securityhub – Allows principals full access to all Security Hub CSPM actions.

  • guardduty – Allows principals to get information about account status in Amazon GuardDuty.

  • iam – Allows principals to create a service-linked role for Security Hub CSPM and Security Hub.

  • inspector – Allows principals to get information about account status in Amazon Inspector.

  • pricing – Allows principals to get a price list of AWS services and products.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "SecurityHubAllowAll", "Effect": "Allow", "Action": "securityhub:*", "Resource": "*" }, { "Sid": "SecurityHubServiceLinkedRole", "Effect": "Allow", "Action": "iam:CreateServiceLinkedRole", "Resource": "*", "Condition": { "StringLike": { "iam:AWSServiceName": [ "securityhub.amazonaws.com", "securityhubv2.amazonaws.com" ] } } }, { "Sid": "OtherServicePermission", "Effect": "Allow", "Action": [ "guardduty:GetDetector", "guardduty:ListDetectors", "inspector2:BatchGetAccountStatus", "pricing:GetProducts" ], "Resource": "*" } ] }

Security Hub CSPM managed policy: AWSSecurityHubReadOnlyAccess

You can attach the AWSSecurityHubReadOnlyAccess policy to your IAM identities.

This policy grants read-only permissions that allow users to view information in Security Hub CSPM. Principals with this policy attached cannot make any updates in Security Hub CSPM. For example, principals with these permissions can view the list of findings associated with their account, but cannot change the status of a finding. They can view the results of insights, but cannot create or configure custom insights. They cannot configure controls or product integrations.

Permissions details

This policy includes the following permissions.

  • securityhub – Allows users to perform actions that return either a list of items or details about an item. This includes API operations that start with Get, List, or Describe.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "AWSSecurityHubReadOnlyAccess", "Effect": "Allow", "Action": [ "securityhub:Get*", "securityhub:List*", "securityhub:BatchGet*", "securityhub:Describe*" ], "Resource": "*" } ] }

AWS managed policy: AWSSecurityHubOrganizationsAccess

You can attach the AWSSecurityHubOrganizationsAccess policy to your IAM identities.

This policy grants administrative permissions to enable and manage Security Hub and Security Hub CSPM within an organization.

The permissions this policy allow the organization management account to designate the delegated administrator account for Security Hub and Security Hub CSPM. They also allow the delegated administrator account to enable organization accounts as member accounts.

This policy only provides the permissions for Organizations. The organization management account and delegated administrator account also require permissions for associated actions. These permissions can be granted using the AWSSecurityHubFullAccess managed policy.

Permissions details

This policy includes the following permissions.

  • organizations:ListAccounts – Allows principals to retrieve the list of accounts that are part of an organization.

  • organizations:DescribeOrganization – Allows principals to retrieve information about the organization.

  • organizations:ListRoots – Allows principals to list the root of an organization.

  • organizations:ListDelegatedAdministrators – Allows principals to list the delegated administrator of an organization.

  • organizations:ListAWSServiceAccessForOrganization – Allows principals to list the AWS services that an organization uses.

  • organizations:ListOrganizationalUnitsForParent – Allows principals to list the child organizational units (OU) of a parent OU.

  • organizations:ListAccountsForParent – Allows principals to list the child accounts of a parent OU.

  • organizations:ListParents – Lists the root or organizational units (OUs) that serve as the immediate parent of the specified child OU or account.

  • organizations:DescribeAccount – Allows principals to retrieve information about an account in the organization.

  • organizations:DescribeOrganizationalUnit – Allows principals to retrieve information about an OU in the organization.

  • organizations:ListPolicies – Retrieves the list of all policies in an organization of a specified type.

  • organizations:ListPoliciesForTarget – Lists the policies that are directly attached to the specified target root, organizational unit (OU), or account.

  • organizations:ListTargetsForPolicy – Lists all the roots, organizational units (OUs), and accounts that the specified policy is attached to.

  • organizations:EnableAWSServiceAccess – Allows principals to enable the integration with Organizations.

  • organizations:RegisterDelegatedAdministrator – Allows principals to designate the delegated administrator account.

  • organizations:DeregisterDelegatedAdministrator – Allows principals to remove the delegated administrator account.

  • organizations:DescribePolicy – Retrieves information about a policy.

  • organizations:DescribeEffectivePolicy – Returns the contents of the effective policy for specified policy type and account.

  • organizations:CreatePolicy – Creates a policy of a specified type that you can attach to a root, an organizational unit (OU), or an individual AWS account.

  • organizations:UpdatePolicy – Updates an existing policy with a new name, description, or content.

  • organizations:DeletePolicy – Deletes the specified policy from your organization.

  • organizations:AttachPolicy – Attaches a policy to a root, an organizational unit (OU), or an individual account.

  • organizations:DetachPolicy – Detaches a policy from a target root, organizational unit (OU), or account.

  • organizations:EnablePolicyType – Enables a policy type in a root.

  • organizations:DisablePolicyType – Disables an organizational policy type in a root.

  • organizations:TagResource – Adds one or more tags to the specified resource.

  • organizations:UntagResource – Removes any tags with the specified keys from the specified resource.

  • organizations:ListTagsForResource – Lists tags that are attached to the specified resource.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "OrganizationPermissions", "Effect": "Allow", "Action": [ "organizations:ListAccounts", "organizations:DescribeOrganization", "organizations:ListRoots", "organizations:ListDelegatedAdministrators", "organizations:ListAWSServiceAccessForOrganization", "organizations:ListOrganizationalUnitsForParent", "organizations:ListAccountsForParent", "organizations:ListParents", "organizations:DescribeAccount", "organizations:DescribeOrganizationalUnit", "organizations:ListPolicies", "organizations:ListPoliciesForTarget", "organizations:ListTargetsForPolicy" ], "Resource": "*" }, { "Sid": "OrganizationPermissionsEnable", "Effect": "Allow", "Action": "organizations:EnableAWSServiceAccess", "Resource": "*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": "securityhub.amazonaws.com" } } }, { "Sid": "OrganizationPermissionsDelegatedAdmin", "Effect": "Allow", "Action": [ "organizations:RegisterDelegatedAdministrator", "organizations:DeregisterDelegatedAdministrator" ], "Resource": "arn:aws:organizations::*:account/o-*/*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": "securityhub.amazonaws.com" } } }, { "Sid": "OrganizationPolicyPermissions", "Effect": "Allow", "Action": [ "organizations:DescribePolicy", "organizations:DescribeEffectivePolicy", "organizations:CreatePolicy", "organizations:UpdatePolicy", "organizations:DeletePolicy", "organizations:AttachPolicy", "organizations:DetachPolicy", "organizations:EnablePolicyType", "organizations:DisablePolicyType" ], "Resource": [ "arn:aws:organizations::*:root/o-*/*", "arn:aws:organizations::*:account/o-*/*", "arn:aws:organizations::*:ou/o-*/*", "arn:aws:organizations::*:policy/o-*/securityhub_policy/*" ], "Condition": { "StringLikeIfExists": { "organizations:PolicyType": "SECURITYHUB_POLICY" } } }, { "Sid": "OrganizationPolicyTaggingPermissions", "Effect": "Allow", "Action": [ "organizations:TagResource", "organizations:UntagResource", "organizations:ListTagsForResource" ], "Resource": [ "arn:aws:organizations::*:policy/o-*/securityhub_policy/*" ] } ] }

AWS managed policy: AWSSecurityHubServiceRolePolicy

You can't attach AWSSecurityHubServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role that allows Security Hub CSPM to perform actions on your behalf. For more information, see Service-linked roles for AWS Security Hub.

This policy grants administrative permissions that allow the service-linked role to perform the security checks for Security Hub CSPM controls.

Permissions details

This policy includes permissions to do the following:

  • cloudtrail – Retrieve information about CloudTrail trails.

  • cloudwatch – Retrieve the current CloudWatch alarms.

  • logs – Retrieve the metric filters for CloudWatch logs.

  • sns – Retrieve the list of subscriptions to an SNS topic.

  • config – Retrieve information about configuration recorders, resources, and AWS Config rules. Also allows the service-linked role to create and delete AWS Config rules, and to run evaluations against the rules.

  • iam – Get and generate credential reports for accounts.

  • organizations – Retrieve account and organizational unit (OU) information for an organization.

  • securityhub – Retrieve information about how the Security Hub CSPM service, standards, and controls are configured.

  • tag – Retrieve information about resource tags.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "SecurityHubServiceRolePermissions", "Effect": "Allow", "Action": [ "cloudtrail:DescribeTrails", "cloudtrail:GetTrailStatus", "cloudtrail:GetEventSelectors", "cloudwatch:DescribeAlarms", "cloudwatch:DescribeAlarmsForMetric", "logs:DescribeMetricFilters", "sns:ListSubscriptionsByTopic", "config:DescribeConfigurationRecorders", "config:DescribeConfigurationRecorderStatus", "config:DescribeConfigRules", "config:DescribeConfigRuleEvaluationStatus", "config:BatchGetResourceConfig", "config:SelectResourceConfig", "iam:GenerateCredentialReport", "organizations:ListAccounts", "config:PutEvaluations", "tag:GetResources", "iam:GetCredentialReport", "organizations:DescribeAccount", "organizations:DescribeOrganization", "organizations:ListChildren", "organizations:ListAWSServiceAccessForOrganization", "organizations:DescribeOrganizationalUnit", "securityhub:BatchDisableStandards", "securityhub:BatchEnableStandards", "securityhub:BatchUpdateStandardsControlAssociations", "securityhub:BatchGetSecurityControls", "securityhub:BatchGetStandardsControlAssociations", "securityhub:CreateMembers", "securityhub:DeleteMembers", "securityhub:DescribeHub", "securityhub:DescribeOrganizationConfiguration", "securityhub:DescribeStandards", "securityhub:DescribeStandardsControls", "securityhub:DisassociateFromAdministratorAccount", "securityhub:DisassociateMembers", "securityhub:DisableSecurityHub", "securityhub:EnableSecurityHub", "securityhub:GetEnabledStandards", "securityhub:ListStandardsControlAssociations", "securityhub:ListSecurityControlDefinitions", "securityhub:UpdateOrganizationConfiguration", "securityhub:UpdateSecurityControl", "securityhub:UpdateSecurityHubConfiguration", "securityhub:UpdateStandardsControl", "tag:GetResources" ], "Resource": "*" }, { "Sid": "SecurityHubServiceRoleConfigPermissions", "Effect": "Allow", "Action": [ "config:PutConfigRule", "config:DeleteConfigRule", "config:GetComplianceDetailsByConfigRule" ], "Resource": "arn:aws:config:*:*:config-rule/aws-service-rule/*securityhub*" }, { "Sid": "SecurityHubServiceRoleOrganizationsPermissions", "Effect": "Allow", "Action": [ "organizations:ListDelegatedAdministrators" ], "Resource": "*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": [ "securityhub.amazonaws.com" ] } } } ] }

AWS managed policy: AWSSecurityHubV2ServiceRolePolicy

Note

Security Hub is in preview release and subject to change.

This policy allows Security Hub to manage AWS Config rules and Security Hub resources in your organization and on your behalf. This policy is attached to a service-linked role that allows the service to perform actions on your behalf. You cannot attach this policy to your users, groups, or roles. For more information, see Service-linked roles for AWS Security Hub.

Permissions details

This policy includes permissions to do the following:

  • config – Manages service-linked configuration recorders for Security Hub resources.

  • iam – Creates the service-linked role for AWS Config.

  • organizations – Retrieves account and organizational unit (OU) information for an organization.

  • securityhub – Manages the Security Hub configuration.

  • tag – Retrieves information about resource tags.

{ "Version": "2012-10-17", "Statement": [ { "Sid": "SecurityHubV2ServiceRoleAssetsConfig", "Effect": "Allow", "Action": [ "config:DeleteServiceLinkedConfigurationRecorder", "config:DescribeConfigurationRecorders", "config:DescribeConfigurationRecorderStatus", "config:PutServiceLinkedConfigurationRecorder" ], "Resource": "arn:aws:config:*:*:configuration-recorder/AWSConfigurationRecorderForSecurityHubAssets/*" }, { "Sid": "SecurityHubV2ServiceRoleAssetsIamPermissions", "Effect": "Allow", "Action": [ "iam:CreateServiceLinkedRole" ], "Resource": "arn:aws:iam::*:role/aws-service-role/config.amazonaws.com/AWSServiceRoleForConfig", "Condition": { "StringEquals": { "iam:AWSServiceName": "config.amazonaws.com" } } }, { "Sid": "SecurityHubV2ServiceRoleSecurityHubPermissions", "Effect": "Allow", "Action": [ "securityhub:DisableSecurityHubV2", "securityhub:EnableSecurityHubV2", "securityhub:DescribeSecurityHubV2" ], "Resource": "arn:aws:securityhub:*:*:hubv2/*", "Condition": { "StringEquals": { "aws:ResourceAccount": "${aws:PrincipalAccount}" } } }, { "Sid": "SecurityHubV2ServiceRoleTagPermissions", "Effect": "Allow", "Action": [ "tag:GetResources" ], "Resource": "*" }, { "Sid": "SecurityHubV2ServiceRoleOrganizationsPermissionsOnResources", "Effect": "Allow", "Action": [ "organizations:DescribeAccount", "organizations:DescribeOrganizationalUnit" ], "Resource": "arn:aws:organizations::*:*" }, { "Sid": "SecurityHubV2ServiceRoleOrganizationsPermissionsWithoutResources", "Effect": "Allow", "Action": [ "organizations:DescribeOrganization", "organizations:ListAccounts", "organizations:ListAWSServiceAccessForOrganization", "organizations:ListChildren" ], "Resource": "*" }, { "Sid": "SecurityHubV2ServiceRoleDelegatedAdminPermissions", "Effect": "Allow", "Action": [ "organizations:ListDelegatedAdministrators" ], "Resource": "*", "Condition": { "StringEquals": { "organizations:ServicePrincipal": [ "securityhub.amazonaws.com" ] } } } ] }

Security Hub CSPM updates to AWS managed policies

View details about updates to AWS managed policies for Security Hub CSPM since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Security Hub CSPM Document history page.

Change Description Date
AWSSecurityHubOrganizationsAccess – Update to existing policy Security Hub CSPM added new permission to AWSSecurityHubOrganizationsAccess. The permission allows the organization management to enable and manage Security Hub and Security Hub CSPM within an organization. June 17, 2025

AWSSecurityHubOrganizationsAccess – Update to an existing policy

Added new permissions that allow the organization management to enable and manage Security Hub and Security Hub CSPM within an organization.

June 17, 2025

AWSSecurityHubFullAccess – Update to an existing policy

Security Hub CSPM added new permission that allows principals to create a service-linked role for Security Hub.

June 17, 2025

AWSSecurityHubV2ServiceRolePolicy – New policy

Security Hub added new policy to allow Security Hub to manage AWS Config rules and Security Hub resources in a customer's organization and on the customer's behalf. Security Hub is in preview release and subject to change.

June 17, 2025
AWSSecurityHubFullAccess – Update to an existing policy Security Hub CSPM updated the policy to get pricing details for AWS services and products. April 24, 2024
AWSSecurityHubReadOnlyAccess – Update to an existing policy Security Hub CSPM updated this managed policy by adding a Sid field. February 22, 2024
AWSSecurityHubFullAccess – Update to an existing policy Security Hub CSPM updated the policy so it can determine if Amazon GuardDuty and Amazon Inspector are enabled in an account. This helps customers bring together security-related information from multiple AWS services. November 16, 2023
AWSSecurityHubOrganizationsAccess – Update to an existing policy Security Hub CSPM updated the policy to grant additional permissions to allow read-only access to AWS Organizations delegated administrator functionality. This includes details like the root, organizational units (OUs), accounts, organizational structure, and service access. November 16, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM added the BatchGetSecurityControls, DisassociateFromAdministratorAccount, and UpdateSecurityControl permissions to read and update customizable security control properties. November 26, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM added the tag:GetResources permission to read resource tags related to findings. November 7, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM added the BatchGetStandardsControlAssociations permission to get information about the enablement status of a control in a standard. September 27, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM added new permissions to get AWS Organizations data and read and update Security Hub CSPM configurations, including standards and controls. September 20, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM moved the existing config:DescribeConfigRuleEvaluationStatus permission to a different statement within the policy. The config:DescribeConfigRuleEvaluationStatus permission is now applied to all resources. March 17, 2023
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM moved the existing config:PutEvaluations permission to a different statement within the policy. The config:PutEvaluations permission is now applied to all resources. July 14, 2021
AWSSecurityHubServiceRolePolicy – Update to an existing policy Security Hub CSPM added a new permission to allow the service-linked role to deliver evaluation results to AWS Config. June 29, 2021
AWSSecurityHubServiceRolePolicy – Added to the list of managed policies Added information about the managed policy AWSSecurityHubServiceRolePolicy, which is used by the Security Hub CSPM service-linked role. June 11, 2021
AWSSecurityHubOrganizationsAccess – New policy Security Hub CSPM added a new policy that grants permissions that are needed for the Security Hub CSPM integration with Organizations. March 15, 2021
Security Hub CSPM started tracking changes Security Hub CSPM started tracking changes for its AWS managed policies. March 15, 2021