Verified Access logging permissions
The IAM principal being used to configure the logging destination needs to have certain permissions for logging to work properly. The following sections show the permissions required for each logging destination.
For delivery to CloudWatch Logs:
ec2:ModifyVerifiedAccessInstanceLoggingConfigurationon the Verified Access instancelogs:CreateLogDelivery,logs:DeleteLogDelivery,logs:GetLogDelivery,logs:ListLogDeliveries, andlogs:UpdateLogDeliveryon all resourceslogs:DescribeLogGroups,logs:DescribeResourcePolicies, andlogs:PutResourcePolicyon the destination log group
For delivery to Amazon S3:
ec2:ModifyVerifiedAccessInstanceLoggingConfigurationon the Verified Access instancelogs:CreateLogDelivery,logs:DeleteLogDelivery,logs:GetLogDelivery,logs:ListLogDeliveries, andlogs:UpdateLogDeliveryon all resourcess3:GetBucketPolicyands3:PutBucketPolicyon the destination bucket
For delivery to Firehose:
ec2:ModifyVerifiedAccessInstanceLoggingConfigurationon the Verified Access instancefirehose:TagDeliveryStreamon all resourcesiam:CreateServiceLinkedRoleon all resourceslogs:CreateLogDelivery,logs:DeleteLogDelivery,logs:GetLogDelivery,logs:ListLogDeliveries, andlogs:UpdateLogDeliveryon all resources