How To Allow AWS IAM Users EBS Snapshot Create And Delete Access
erics, July 29th, 2021
SUMMARY: Needed to create an AWS IAM Policy to allow a user access to create and delete EBS snapshots. This script also needed to be able to list volumes:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 |
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "ec2:DeleteSnapshot", "ec2:ModifySnapshotAttribute", "ec2:CreateSnapshots", "ec2:ResetSnapshotAttribute", "ec2:CreateSnapshot" ], "Resource": [ "arn:aws:ec2:*:ACCOUNT_ID_HERE:volume/*", "arn:aws:ec2:*:ACCOUNT_ID_HERE:snapshot/*", "arn:aws:ec2:*:ACCOUNT_ID_HERE:instance/*" ] }, { "Sid": "VisualEditor1", "Effect": "Allow", "Action": [ "ec2:DescribeSnapshotAttribute", "ec2:DescribeVolumes", "ec2:DescribeSnapshots" ], "Resource": "*" } ] } |