AWS managed policies for Amazon Route 53 (original) (raw)

An AWS managed policy is a standalone policy that is created and administered by AWS. AWS managed policies are designed to provide permissions for many common use cases so that you can start assigning permissions to users, groups, and roles.

Keep in mind that AWS managed policies might not grant least-privilege permissions for your specific use cases because they're available for all AWS customers to use. We recommend that you reduce permissions further by defining customer managed policies that are specific to your use cases.

You cannot change the permissions defined in AWS managed policies. If AWS updates the permissions defined in an AWS managed policy, the update affects all principal identities (users, groups, and roles) that the policy is attached to. AWS is most likely to update an AWS managed policy when a new AWS service is launched or new API operations become available for existing services.

For more information, see AWS managed policies in the IAM User Guide.

AWS managed policy: AmazonRoute53FullAccess

You can attach the AmazonRoute53FullAccess policy to your IAM identities.

This policy grants full access to Route 53 resources, including domain registration and health checking, but excluding Resolver.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "route53:*",
                "route53domains:*",
                "cloudfront:ListDistributions",
                "cloudfront:GetDistributionTenantByDomain",
                "cloudfront:GetConnectionGroup",
                "cloudwatch:DescribeAlarms",
                "cloudwatch:GetMetricStatistics",
                "cloudwatch:GetMetricData",
                "ec2:DescribeVpcs",
                "ec2:DescribeVpcEndpoints",
                "ec2:DescribeRegions",
                "elasticloadbalancing:DescribeLoadBalancers",
                "elasticbeanstalk:DescribeEnvironments",
                "es:ListDomainNames",
                "es:DescribeDomains",
                "lightsail:GetContainerServices",
                "s3:ListBucket",
                "s3:GetBucketLocation",
                "s3:GetBucketWebsite",
                "sns:ListTopics",
                "sns:ListSubscriptionsByTopic",
                "tag:GetResources"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "apigateway:GET",
            "Resource": "arn:aws:apigateway:*::/domainnames"
        }
    ]
}

AWS managed policy: AmazonRoute53ReadOnlyAccess

You can attach the AmazonRoute53ReadOnlyAccess policy to your IAM identities.

This policy grants read-only access to Route 53 resources, including domain registration and health checking, but excluding Resolver.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "route53:Get*",
                "route53:List*",
                "route53:TestDNSAnswer"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: AmazonRoute53DomainsFullAccess

You can attach the AmazonRoute53DomainsFullAccess policy to your IAM identities.

This policy grants full access to Route 53 domain registration resources.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "route53:CreateHostedZone",
                "route53domains:*"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: AmazonRoute53DomainsReadOnlyAccess

You can attach the AmazonRoute53DomainsReadOnlyAccess policy to your IAM identities.

This policy grants read-only access to Route 53 domain registration resources.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "route53domains:Get*",
                "route53domains:List*"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: AmazonRoute53ResolverFullAccess

You can attach the AmazonRoute53ResolverFullAccess policy to your IAM identities.

This policy grants full access to Route 53 Resolver resources.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AmazonRoute53ResolverFullAccess",
            "Effect": "Allow",
            "Action": [
                "route53resolver:*",
                "ec2:DescribeSubnets",
                "ec2:CreateNetworkInterface",
                "ec2:DeleteNetworkInterface",
                "ec2:ModifyNetworkInterfaceAttribute",
                "ec2:DescribeNetworkInterfaces",
                "ec2:CreateNetworkInterfacePermission",
                "ec2:DescribeSecurityGroups",
                "ec2:DescribeVpcs",
                "ec2:DescribeAvailabilityZones"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: AmazonRoute53ResolverReadOnlyAccess

You can attach the AmazonRoute53ResolverReadOnlyAccess policy to your IAM identities.

This policy grants read-only access to Route 53 Resolver resources.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AmazonRoute53ResolverReadOnlyAccess",
            "Effect": "Allow",
            "Action": [
                "route53resolver:Get*",
                "route53resolver:List*",
                "ec2:DescribeNetworkInterfaces",
                "ec2:DescribeSecurityGroups",
                "ec2:DescribeVpcs",
                "ec2:DescribeSubnets"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: Route53ResolverServiceRolePolicy

You can't attach Route53ResolverServiceRolePolicy to your IAM entities. This policy is attached to a service-linked role that allows Route 53 Resolver to access AWS services and resources that are used or managed by Resolver. For more information, seeUsing Service-Linked Roles for Amazon Route 53 Resolver.

AWS managed policy: AmazonRoute53ProfilesFullAccess

You can attach the AmazonRoute53ProfilesReadOnlyAccess policy to your IAM identities.

This policy grants full access to Amazon Route 53 Profile resources.

Permissions details

This policy includes the following permissions.

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AmazonRoute53ProfilesFullAccess",
            "Effect": "Allow",
            "Action": [
                "route53profiles:AssociateProfile",
                "route53profiles:AssociateResourceToProfile",
                "route53profiles:CreateProfile",
                "route53profiles:DeleteProfile",
                "route53profiles:DisassociateProfile",
                "route53profiles:DisassociateResourceFromProfile",
                "route53profiles:UpdateProfileResourceAssociation",
                "route53profiles:GetProfile",
                "route53profiles:GetProfileAssociation",
                "route53profiles:GetProfileResourceAssociation",
                "route53profiles:GetProfilePolicy",
                "route53profiles:ListProfileAssociations",
                "route53profiles:ListProfileResourceAssociations",
                "route53profiles:ListProfiles",
                "route53profiles:PutProfilePolicy",
                "route53profiles:ListTagsForResource",
                "route53profiles:TagResource",
                "route53profiles:UntagResource",
                "route53resolver:GetFirewallConfig",
                "route53resolver:GetFirewallRuleGroup",
                "route53resolver:GetResolverConfig",
                "route53resolver:GetResolverDnssecConfig",
                "route53resolver:GetResolverQueryLogConfig",
                "route53resolver:GetResolverRule",
                "ec2:DescribeVpcs",
                "route53:GetHostedZone"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

AWS managed policy: AmazonRoute53ProfilesReadOnlyAccess

You can attach the AmazonRoute53ProfilesReadOnlyAccess policy to your IAM identities.

This policy grants read-only access to Amazon Route 53 Profile resources.

Permissions details

For more information about the permissions, see Amazon Route 53 API permissions: Actions, resources, and conditions reference.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AmazonRoute53ProfilesReadOnlyAccess",
            "Effect": "Allow",
            "Action": [
                "route53profiles:GetProfile",
                "route53profiles:GetProfileAssociation",
                "route53profiles:GetProfileResourceAssociation",
                "route53profiles:GetProfilePolicy",
                "route53profiles:ListProfileAssociations",
                "route53profiles:ListProfileResourceAssociations",
                "route53profiles:ListProfiles",
                "route53profiles:ListTagsForResource",
                "route53resolver:GetFirewallConfig",
                "route53resolver:GetResolverConfig",
                "route53resolver:GetResolverDnssecConfig",
                "route53resolver:GetResolverQueryLogConfig"
            ],
            "Resource": [
                "*"
            ]
        }
    ]
}

Route 53 updates to AWS managed policies

View details about updates to AWS managed policies for Route 53 since this service began tracking these changes. For automatic alerts about changes to this page, subscribe to the RSS feed on the Route 53 Document history page.

Change Description Date
AmazonRoute53FullAccess – Updated policy Adds permissions for cloudwatch:GetMetricData ,tag:GetResources, es:ListDomainNames,es:DescribeDomains,cloudfront:GetDistributionTenantByDomain,cloudfront:GetConnectionGroup andlightsail:GetContainerServices. These permissions enable you to fetch up to 500 CloudWatch health check metrics, up to 100 names of health checks, get the domain configuration for the specified Amazon OpenSearch Service domains, and list the names of all Amazon OpenSearch Service domains owned by the current user in the active Region, fetch the CloudFront multi-tenant distributions and get the Lightsail container services. June 01, 2025
AmazonRoute53ProfilesFullAccess – Updated policy Adds permissions for GetProfilePolicy and PutProfilePolicy. These are permission-only IAM actions. If an IAM principal doesn't have these permissions granted, an error will occur when attempting to share the Profile using the AWS RAM service. August 27, 2024
AmazonRoute53ProfilesReadOnlyAccess – Updated policy Adds permissions for GetProfilePolicy. This is a permission-only IAM action. If an IAM principal doesn't have this permission granted, an error will occur attempting to access the Profile's policy using the AWS RAM service. August 27, 2024
AmazonRoute53ResolverFullAccess– Updated policy Added a statement id (Sid) to uniquely identity the policy. August 5, 2024
AmazonRoute53ResolverReadOnlyAccess– Updated policy Added a statement id (Sid) to uniquely identity the policy. August 5, 2024
AmazonRoute53ProfilesFullAccess – New policy Amazon Route 53 added a new policy to allow full access to Amazon Route 53 Profile resources. April 22, 2024
AmazonRoute53ProfilesReadOnlyAccess – New policy Amazon Route 53 added a new policy to allow read-only access to Amazon Route 53 Profile resources. April 22, 2024
Route53ResolverServiceRolePolicy– New policy Amazon Route 53 added a new policy that is attached to a service-linked role that allows Route 53 Resolver to access AWS services and resources that are used or managed by Resolver. July 14, 2021
AmazonRoute53ResolverReadOnlyAccess– New policy Amazon Route 53 added a new policy to allow read-only access to Route 53 Resolver resources. July 14, 2021
AmazonRoute53ResolverFullAccess– New policy Amazon Route 53 added a new policy to allow full access to Route 53 Resolver resources. July 14, 2021
AmazonRoute53DomainsReadOnlyAccess– New policy Amazon Route 53 added a new policy to allow read-only access to Route 53 domains resources. July 14, 2021
AmazonRoute53DomainsFullAccess– New policy Amazon Route 53 added a new policy to allow full access to Route 53 domains resources. July 14, 2021
AmazonRoute53ReadOnlyAccess– New policy Amazon Route 53 added a new policy to allow read-only access to Route 53 resources. July 14, 2021
AmazonRoute53FullAccess– New policy Amazon Route 53 added a new policy to allow full access to Route 53 resources. July 14, 2021
Route 53 started tracking changes Route 53 started tracking changes for its AWS managed policies. July 14, 2021