AWS AddPermission20150331v2
Adds a permission to a Lambda function's resource-based policy, allowing specified principals to invoke the function.
All events with tag AWS.
Adds a permission to a Lambda function's resource-based policy, allowing specified principals to invoke the function.
Adds an IAM role to an EC2 instance profile, enabling EC2 instances to assume that role and access AWS services.
Adds an IAM user to a specified group, granting the user all permissions attached to that group.
Archives GuardDuty findings to suppress active security alerts from SOC visibility.
Associates an IAM instance profile with an EC2 instance, granting the instance permissions defined by the profile's IAM role.
Returns temporary security credentials for assuming an IAM role. Allows an entity (user, service, or account) to act with the role's permissions.
Returns temporary credentials for a SAML-authenticated user to assume an IAM role, used in federated SSO scenarios.
Returns temporary credentials for a user authenticated via an OIDC identity provider (e.g., Cognito, Google) to assume an IAM role.
Attaches a managed IAM policy to a group, granting all group members the permissions defined in that policy.
Attaches a managed IAM policy to an IAM role, granting the role the permissions defined in that policy.
Attaches a managed IAM policy directly to an IAM user, granting them the permissions defined in that policy.
Adds inbound rules to an RDS DB security group, allowing specified IP ranges or EC2 security groups to access the database.
Adds outbound rules to a VPC security group, permitting traffic from instances to specified destination IP ranges or security groups.
Adds inbound rules to a VPC security group, permitting traffic from specified IP ranges or security groups to reach instances.
Allows an IAM user to change their own AWS Management Console login password.
Records a sign-in attempt to the AWS Management Console, capturing success or failure status and whether MFA was used.
Copies an object from one S3 location to another, within or across buckets, optionally modifying metadata or encryption.
Creates an access entry for an EKS cluster, granting an IAM principal Kubernetes API access via EKS access management.
Creates a new long-term access key for an IAM user, enabling programmatic access to AWS services.
Creates a new AWS account as a member of an AWS Organization under the management account.
Creates an SSM State Manager association, binding a document to instances for persistent or scheduled command execution.
Creates a manual point-in-time snapshot of an RDS database instance for backup or recovery purposes.
Creates a Glue development endpoint providing SSH access into the Glue VPC with the Glue service role.
Creates a GuardDuty finding filter that automatically suppresses or highlights findings matching specified criteria.
Creates an Amazon Machine Image (AMI) from a running or stopped EC2 instance, capturing its disk state for reuse.
Exports an EC2 instance as a virtual machine image to an S3 bucket in a format such as OVF or VMDK.
Creates a GuardDuty IP set — a list of trusted or known malicious IP addresses used in threat intelligence.
Creates an EC2 key pair and returns the private key material, used for SSH authentication to EC2 instances.
Creates a password for an IAM user, enabling them to sign into the AWS Management Console.
Adds an allow or deny rule to a Network ACL, controlling traffic entering or leaving a specific VPC subnet.
Registers an OIDC identity provider with IAM, enabling federated access from external identity systems like GitHub Actions.
Creates a new managed IAM policy that can be attached to users, groups, or roles to define permissions.
Creates a new version of an IAM managed policy, which can optionally be set as the default active version.
Creates a new IAM role with a trust policy that defines which principals are permitted to assume it.
Registers a SAML 2.0 identity provider metadata document with IAM, enabling federated authentication via SAML.
Creates a service-linked IAM role that allows an AWS service to perform actions on your behalf.
Creates a point-in-time snapshot of an EBS volume, stored durably for backup or volume duplication.
Creates a CloudFormation stack by provisioning AWS resources defined in a specified template.
Creates a new IAM user in the AWS account for programmatic or console-based access.
Creates a virtual MFA device that can be associated with an IAM user for multi-factor authentication.
Deactivates an MFA device associated with an IAM user, removing the MFA requirement for their authentication.
Permanently deletes an IAM user's access key, revoking the associated programmatic access credentials.
Deletes one or more CloudWatch alarms, removing their monitoring configurations and associated notifications.
Permanently deletes an S3 bucket; the bucket must be empty before deletion can succeed.
Removes the resource-based policy from an S3 bucket, reverting to default access controls.
Deletes an AWS Config rule that was evaluating the compliance of AWS resource configurations.
Deletes the AWS Config configuration recorder, stopping resource configuration recording in the region.
Permanently deletes an Aurora DB cluster and optionally its automated backups.
Permanently deletes an RDS database instance, with an option to take a final snapshot before deletion.
Deletes the AWS Config delivery channel, stopping delivery of configuration snapshots and change notifications to S3 or SNS.
Disables and permanently deletes a GuardDuty detector in the region, stopping all threat detection.
Deletes a CloudTrail Lake event data store, destroying stored forensic evidence and audit logs.
Permanently deletes an EFS file system and all its data; all mount targets must be deleted first.
Deletes VPC Flow Log configurations, stopping the capture of network traffic metadata for the specified resources.
Deletes an Aurora global database cluster that spans multiple AWS regions.
Permanently deletes a CloudWatch Logs log group and all its log streams and stored data.
Removes an IAM user's console password, preventing them from signing in to the AWS Management Console.
Permanently deletes a log stream and all its events from within a CloudWatch Logs log group.
Removes member accounts from a GuardDuty administrator account, ending the delegated monitoring relationship.
Deletes a Network ACL from a VPC; the default NACL cannot be deleted.
Removes a rule from a Network ACL, modifying traffic filtering for the associated VPC subnet.
Deletes a single object from an S3 bucket; with versioning enabled, a delete marker is created instead.
Deletes multiple S3 objects in a single batch request, more efficient than individual delete operations.
Removes the permissions boundary from an IAM role, potentially expanding the role's maximum effective permissions.
Deletes an inline policy embedded directly in an IAM role.
Permanently deletes a WAF rule group containing a set of web traffic filtering rules.
Permanently deletes an EBS snapshot; any AMIs based on it must be deregistered first.
Permanently deletes a CloudTrail trail, stopping API activity logging for that trail configuration.
Permanently deletes an IAM user; all attached policies, group memberships, and keys must be removed first.
Removes the permissions boundary from an IAM user, potentially expanding their maximum effective permissions.
Deletes an inline policy embedded directly in an IAM user.
Deletes a virtual MFA device, weakening account security by removing multi-factor authentication.
Permanently deletes an EBS volume; the volume must be detached from any instance before deletion.
Permanently deletes a WAF Web ACL used to protect web applications from common web threats.
Detaches a managed IAM policy from a role, removing those permissions from the role's effective policy.
Detaches a managed IAM policy from an IAM user, removing those permissions from the user.
Disables a KMS encryption key, preventing any operations that depend on it until the key is re-enabled.
Disassociates the current account from its GuardDuty administrator account, ending the delegated monitoring relationship.
Disassociates specified member accounts from a GuardDuty administrator account.
Enables a previously disabled AWS region for the account, making its services available for use.
Enables the EC2 Serial Console at the account level, allowing direct serial port access to instances for troubleshooting.
Retrieves an ECR authorization token for Docker image operations, seen in container escape and lateral movement chains.
Returns temporary security credentials for a federated user, optionally scoped to an inline IAM policy.
Retrieves (downloads) an object from an S3 bucket; logged in CloudTrail only when S3 data events are enabled.
Retrieves one or more parameters from AWS Systems Manager Parameter Store, optionally decrypting SecureString values.
Retrieves the encrypted Windows administrator password for a newly launched EC2 Windows instance.
Retrieves the plaintext value of a secret stored in AWS Secrets Manager.
Returns temporary credentials for an IAM user, typically used to satisfy an MFA requirement for subsequent API calls.
Generates a sign-in token used to construct a federation URL for single sign-on to the AWS Management Console.
Imports an existing RSA or ED25519 public key into EC2 for use as a key pair when launching instances.
Invokes a Lambda function synchronously or asynchronously, triggering its execution with an optional input payload.
Removes the current member account from its AWS Organization; the management account cannot leave.
Modifies settings on an RDS database instance, such as instance class, storage, networking, and access configuration.
Modifies the attributes of an RDS DB snapshot, such as sharing it with other AWS accounts.
Modifies attributes of an AMI, such as making it public or sharing it with specific AWS accounts.
Modifies a specific attribute of an EC2 instance, such as its instance type, user data, or security groups.
Modifies the permissions of an EBS snapshot, such as making it public or sharing it with specific AWS accounts.
Allows a principal to pass an IAM role to an AWS service, granting the service permission to assume that role on their behalf.
Records a request to recover or reset the AWS account root user password via the password reset process.
Sets the Access Control List (ACL) for an S3 bucket, controlling access for specific AWS accounts or predefined groups.
Sets lifecycle configuration on an S3 bucket to automate object transitions or expiration over time.
Sets lifecycle rules on an S3 bucket to automatically transition objects to cheaper storage tiers or expire them.
Applies or replaces the resource-based policy on an S3 bucket, defining who can access it and how.
Modifies S3 bucket public access block settings, potentially disabling protections to allow public data exposure.
Enables replication for an S3 bucket, automatically copying objects to a destination bucket in the same or another region.
Configures which API events (management or data, read/write) a CloudTrail trail records.
Creates or updates an inline policy embedded directly in an IAM group.
Pushes a container image to ECR, potentially introducing backdoored images into the deployment pipeline.
Modifies a KMS key policy to grant cross-account access or expand key usage permissions.
Sets a permissions boundary on an IAM role, capping the maximum permissions the role can be granted.
Creates or updates an inline policy embedded directly in an IAM role.
Creates an EventBridge rule that triggers on specific events, used for persistent execution of Lambda or other targets.
Adds or updates targets for an EventBridge rule, defining which resources are invoked when the rule matches an event.
Sets a permissions boundary on an IAM user, limiting the maximum permissions they can ever be granted.
Creates or updates an inline policy embedded directly in an IAM user.
Removes an AWS account from the organization, stripping it of SCP protections and centralized security controls.
Replaces the IAM instance profile associated with a running EC2 instance with a different one.
Restores an RDS instance from a snapshot, enabling an attacker to access database contents by spinning up a copy.
Resumes a previously disconnected Systems Manager Session Manager session with a managed instance.
Schedules a KMS customer managed key for deletion after a waiting period (7-30 days), after which encrypted data is unrecoverable.
Remotely executes a command or script on one or more managed instances via AWS Systems Manager Run Command.
Pushes an SSH public key to an EC2 instance's serial console interface, enabling SSH access over the serial port.
Pushes a temporary SSH public key to an EC2 instance via EC2 Instance Connect, valid for 60 seconds.
Sets the default version of an IAM managed policy, changing which version of the policy is active for all attached entities.
Records the start of a copy operation for an EBS snapshot shared from another AWS account.
Records the creation of an EBS volume from a snapshot shared by another AWS account.
Starts a CodeBuild build, executing arbitrary code with the build project's IAM role credentials.
Starts an export of an RDS snapshot to Amazon S3 in Apache Parquet format for use in analytics.
Starts an interactive Systems Manager Session Manager session with a managed EC2 instance or on-premises server.
Stops AWS Config from recording resource configuration changes in the region.
Stops logging API activity for a CloudTrail trail, disabling audit log collection for that trail.
Stops GuardDuty from monitoring specified member accounts under an administrator account.
Permanently terminates one or more EC2 instances, releasing instance store data and associated resources.
Changes the status of an IAM user's access key between Active and Inactive.
Updates the trust policy of an IAM role, changing which principals are permitted to assume it.
Updates the configuration of a GuardDuty detector, such as enabling or disabling specific threat detection data sources.
Updates a Glue development endpoint, potentially injecting SSH public keys for unauthorized access.
Updates the feedback status on GuardDuty findings, marking them as useful or not useful.
Updates the code of an existing Lambda function with a new deployment package or container image URI.
Updates Lambda function configuration including environment variables, IAM role, or layers — used to inject credentials or swap execution context.
Modifies the IP addresses or CIDR ranges in a GuardDuty IP set used for threat intelligence.
Updates the console login password for an IAM user.
Modifies the configuration of an existing CloudTrail trail, such as its S3 bucket, log validation, or multi-region settings.