Service: AWS Key Management Service
Short Name:
kms
ARN Format:
arn:aws:kms:${Region}:${Account}:${ResourceType}/${Id}
ARN Regex:
^arn:aws:kms:.+
ReadOnlyAccess
…
AmazonKeyspacesFullAccessAction | Access | Reference | Description |
---|---|---|---|
kms:ListAliases | Docs | Controls permission to view the aliases that are defined in the account. Aliases are optional friendly names that you can associate with AWS KMS keys | |
kms:ListGrants | Docs | Controls permission to view all grants for an AWS KMS key | |
kms:ListKeyPolicies | Docs | Controls permission to view the names of key policies for an AWS KMS key | |
kms:ListKeys | Docs | Controls permission to view the key ID and Amazon Resource Name (ARN) of all AWS KMS keys in the account | |
kms:ListResourceTags | Docs | Controls permission to view all tags that are attached to an AWS KMS key | |
kms:ListRetirableGrants | Docs | Controls permission to view grants in which the specified principal is the retiring principal. Other principals might be able to retire the grant and this principal might be able to retire other grants | |
kms:CreateGrant | Docs | Controls permission to add a grant to an AWS KMS key. You can use grants to add permissions without changing the key policy or IAM policy | |
kms:PutKeyPolicy | Docs | Controls permission to replace the key policy for the specified AWS KMS key | |
kms:RetireGrant | Docs | Controls permission to retire a grant. The RetireGrant operation is typically called by the grant user after they complete the tasks that the grant allowed them to perform | |
kms:RevokeGrant | Docs | Controls permission to revoke a grant, which denies permission for all operations that depend on the grant | |
kms:DescribeCustomKeyStores | Docs | Controls permission to view detailed information about custom key stores in the account and region | |
kms:DescribeKey | Docs | Controls permission to view detailed information about an AWS KMS key | |
kms:GetKeyPolicy | Docs | Controls permission to view the key policy for the specified AWS KMS key | |
kms:GetKeyRotationStatus | Docs | Controls permission to determine whether automatic key rotation is enabled on the AWS KMS key | |
kms:GetParametersForImport | Docs | Controls permission to get data that is required to import cryptographic material into a customer managed key, including a public key and import token | |
kms:GetPublicKey | Docs | Controls permission to download the public key of an asymmetric AWS KMS key | |
kms:TagResource | Docs | Controls permission to create or update tags that are attached to an AWS KMS key | |
kms:UntagResource | Docs | Controls permission to delete tags that are attached to an AWS KMS key | |
kms:CancelKeyDeletion | Docs | Controls permission to cancel the scheduled deletion of an AWS KMS key | |
kms:ConnectCustomKeyStore | Docs | Controls permission to connect or reconnect a custom key store to its associated AWS CloudHSM cluster or external key manager outside of AWS | |
kms:CreateAlias | Docs | Controls permission to create an alias for an AWS KMS key. Aliases are optional friendly names that you can associate with KMS keys | |
kms:CreateCustomKeyStore | Docs | Controls permission to create a custom key store that is backed by an AWS CloudHSM cluster or an external key manager outside of AWS | |
kms:CreateKey | Docs | Controls permission to create an AWS KMS key that can be used to protect data keys and other sensitive information | |
kms:Decrypt | Docs | Controls permission to decrypt ciphertext that was encrypted under an AWS KMS key | |
kms:DeleteAlias | Docs | Controls permission to delete an alias. Aliases are optional friendly names that you can associate with AWS KMS keys | |
kms:DeleteCustomKeyStore | Docs | Controls permission to delete a custom key store | |
kms:DeleteImportedKeyMaterial | Docs | Controls permission to delete cryptographic material that you imported into an AWS KMS key. This action makes the key unusable | |
kms:DisableKey | Docs | Controls permission to disable an AWS KMS key, which prevents it from being used in cryptographic operations | |
kms:DisableKeyRotation | Docs | Controls permission to disable automatic rotation of a customer managed AWS KMS key | |
kms:DisconnectCustomKeyStore | Docs | Controls permission to disconnect the custom key store from its associated AWS CloudHSM cluster or external key manager outside of AWS | |
kms:EnableKey | Docs | Controls permission to change the state of an AWS KMS key to enabled. This allows the KMS key to be used in cryptographic operations | |
kms:EnableKeyRotation | Docs | Controls permission to enable automatic rotation of the cryptographic material in an AWS KMS key | |
kms:Encrypt | Docs | Controls permission to use the specified AWS KMS key to encrypt data and data keys | |
kms:GenerateDataKey | Docs | Controls permission to use the AWS KMS key to generate data keys. You can use the data keys to encrypt data outside of AWS KMS | |
kms:GenerateDataKeyPair | Docs | Controls permission to use the AWS KMS key to generate data key pairs | |
kms:GenerateDataKeyPairWithoutPlaintext | Docs | Controls permission to use the AWS KMS key to generate data key pairs. Unlike the GenerateDataKeyPair operation, this operation returns an encrypted private key without a plaintext copy | |
kms:GenerateDataKeyWithoutPlaintext | Docs | Controls permission to use the AWS KMS key to generate a data key. Unlike the GenerateDataKey operation, this operation returns an encrypted data key without a plaintext version of the data key | |
kms:GenerateMac | Docs | Controls permission to use the AWS KMS key to generate message authentication codes | |
kms:GenerateRandom | Docs | Controls permission to get a cryptographically secure random byte string from AWS KMS | |
kms:ImportKeyMaterial | Docs | Controls permission to import cryptographic material into an AWS KMS key | |
kms:ReEncryptFrom | Docs | Controls permission to decrypt data as part of the process that decrypts and reencrypts the data within AWS KMS | |
kms:ReEncryptTo | Docs | Controls permission to encrypt data as part of the process that decrypts and reencrypts the data within AWS KMS | |
kms:ReplicateKey | Docs | Controls permission to replicate a multi-Region primary key | |
kms:ScheduleKeyDeletion | Docs | Controls permission to schedule deletion of an AWS KMS key | |
kms:Sign | Docs | Controls permission to produce a digital signature for a message | |
kms:SynchronizeMultiRegionKey | Docs | Controls access to internal APIs that synchronize multi-Region keys | |
kms:UpdateAlias | Docs | Controls permission to associate an alias with a different AWS KMS key. An alias is an optional friendly name that you can associate with a KMS key | |
kms:UpdateCustomKeyStore | Docs | Controls permission to change the properties of a custom key store | |
kms:UpdateKeyDescription | Docs | Controls permission to delete or change the description of an AWS KMS key | |
kms:UpdatePrimaryRegion | Docs | Controls permission to update the primary Region of a multi-Region primary key | |
kms:Verify | Docs | Controls permission to use the specified AWS KMS key to verify digital signatures | |
kms:VerifyMac | Docs | Controls permission to use the AWS KMS key to verify message authentication codes |
aws:RequestTag/${TagKey}
aws:ResourceTag/${TagKey}
aws:TagKeys
kms:BypassPolicyLockoutSafetyCheck
kms:CallerAccount
kms:CustomerMasterKeySpec
kms:CustomerMasterKeyUsage
kms:DataKeyPairSpec
kms:EncryptionAlgorithm
kms:EncryptionContext:${EncryptionContextKey}
kms:EncryptionContextKeys
kms:ExpirationModel
kms:GrantConstraintType
kms:GrantIsForAWSResource
kms:GrantOperations
kms:GranteePrincipal
kms:KeyOrigin
kms:KeySpec
kms:KeyUsage
kms:MacAlgorithm
kms:MessageType
kms:MultiRegion
kms:MultiRegionKeyType
kms:PrimaryRegion
kms:ReEncryptOnSameKey
kms:RecipientAttestation:ImageSha384
kms:RecipientAttestation:PCR
kms:ReplicaRegion
kms:RequestAlias
kms:ResourceAliases
kms:RetiringPrincipal
kms:ScheduleKeyDeletionPendingWindowInDays
kms:SigningAlgorithm
kms:ValidTo
kms:ViaService
kms:WrappingAlgorithm
kms:WrappingKeySpec