Policy ARN Examples
Click on any of the following managed policy examples to insert its ARN into the configuration (or create create your own policies):
-
Administrator
Grants full access to AWS services and resources (
learn more).
arn:aws:iam::aws:policy/AdministratorAccess
-
System Administrator
Grants permissions to set up and maintain resources for application and development operations (
learn more).
arn:aws:iam::aws:policy/job-function/SystemAdministrator
-
Power User
Grants full access to AWS services and resources, but excludes management of Users, groups, roles, and permissions via IAM and AWS Organizations (
learn more).
arn:aws:iam::aws:policy/PowerUserAccess
-
Billing/Cost Controller
Grants permissions to monitor account usage and cost, and to manage billing, budgets, and payment methods (
learn more).
arn:aws:iam::aws:policy/job-function/Billing
-
Security Auditor
Grants permissions to monitor accounts for compliance with security requirements, and to investigate potential security breaches or potential malicious activity (
learn more).
arn:aws:iam::aws:policy/SecurityAudit
-
Support User
Grants permissions to troubleshoot and resolve issues in an account, and to create and manage AWS support cases (
learn more).
arn:aws:iam::aws:policy/job-function/SupportUser
-
View-Only User
Grants permissions to view resources and basic metadata across all AWS services (
learn more).
arn:aws:iam::aws:policy/job-function/ViewOnlyAccess
IAM Policy Simulator
The IAM Policy Simulator (introduction |
direct link) is a tool that enables you to test the effects of an
IAM policy before you commit it to production.