cloudwatch:PutMetricData
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
99
Allow (Action)
99
Deny (Action)
0
NotAction
2
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: Amazon CloudWatch
Access level
WriteDescription
Grants permission to publish metric data points to Amazon CloudWatch
Allow (Action)
- AWSAppFabricServiceRolePolicy
- AWSCleanRoomsServiceRolePolicy
- AWSDMSFleetAdvisorServiceRolePolicy
- AWSDeepRacerRoboMakerAccessPolicy
- AWSElasticBeanstalkWorkerTier
- AWSFinSpaceServiceRolePolicy
- AWSGlueServiceRole
- AWSHealthImagingServiceRolePolicy
- AWSIPAMServiceRolePolicy
- AWSIncidentManagerServiceRolePolicy
- AWSIoTFleetwiseServiceRolePolicy
- AWSIoTManagedIntegrationsRolePolicy
- AWSIoTRuleActions
- AWSIotRoboRunnerServiceRolePolicy
- AWSM2ServicePolicy
- AWSMediaLiveAnywhereServiceRolePolicy
- AWSPCSServiceRolePolicy
- AWSPanoramaApplianceServiceRolePolicy
- AWSPanoramaGreengrassGroupRolePolicy
- AWSPrivateNetworksServiceRolePolicy
- AWSResilienceHubAsssessmentExecutionPolicy
- AWSRolesAnywhereServicePolicy
- AWSSSMForSAPServiceLinkedRolePolicy
- AWSServiceRoleForAIDevOpsPolicy
- AWSServiceRoleForAWSTransform
- AWSServiceRoleForAWSTransformCustom
- AWSServiceRoleForAmazonQDeveloper
- AWSServiceRoleForCodeWhispererPolicy
- AWSServiceRoleForNeptuneGraphPolicy
- AWSSocialMessagingServiceRolePolicy
- AWSSystemsManagerJustInTimeAccessServicePolicy
- AWSUserNotificationsServiceLinkedRolePolicy
- AWSVpcLatticeServiceRolePolicy
- AWSrePostPrivateCloudWatchAccess
- AmazonAthenaServiceRolePolicy
- AmazonBraketFullAccess
- AmazonBraketJobsExecutionPolicy
- AmazonChimeSDKMediaPipelinesServiceLinkedRolePolicy
- AmazonCloudWatchRUMServiceRolePolicy
- AmazonConnectServiceLinkedRolePolicy
- AmazonConnectSynchronizationServiceRolePolicy
- AmazonDataZoneSageMakerEnvironmentRolePermissionsBoundary
- AmazonDocDB-ElasticServiceRolePolicy
- AmazonEC2RolePolicyForLaunchWizard
- AmazonEC2RoleforSSM
- AmazonEKSServiceRolePolicy
- AmazonEMRServerlessServiceRolePolicy
- AmazonEVSServiceRolePolicy
- AmazonElasticsearchServiceRolePolicy
- AmazonEverestServicePolicy
- AmazonFSxServiceRolePolicy
- AmazonInspector2ServiceRolePolicy
- AmazonMWAAServiceRolePolicy
- AmazonODBServiceRolePolicy
- AmazonOpenSearchDashboardsServiceRolePolicy
- AmazonOpenSearchIngestionServiceRolePolicy
- AmazonOpenSearchServerlessServiceRolePolicy
- AmazonOpenSearchServiceRolePolicy
- AmazonPersonalizeFullAccess
- AmazonRDSBetaServiceRolePolicy
- AmazonRDSCustomInstanceProfileRolePolicy
- AmazonRDSPreviewServiceRolePolicy
- AmazonRDSServiceRolePolicy
- AmazonRedshiftAllCommandsFullAccess
- AmazonRedshiftServiceLinkedRolePolicy
- AmazonSESServiceRolePolicy
- AmazonSSMFullAccess
- AmazonSageMakerClusterInstanceRolePolicy
- AmazonSageMakerFullAccess
- AmazonSageMakerGroundTruthExecution
- AmazonSageMakerHyperPodInferenceAccess
- AmazonTimestreamInfluxDBServiceRolePolicy
- AmazonWorkSpacesThinClientMonitoringServiceRolePolicy
- AmazonWorkSpacesWebServiceRolePolicy
- AppIntegrationsServiceLinkedRolePolicy
- AuroraDsqlServiceLinkedRolePolicy
- CloudWatchAgentAdminPolicy
- CloudWatchAgentServerPolicy
- CloudWatchInternetMonitorServiceRolePolicy
- CloudWatchNetworkFlowMonitorServiceRolePolicy
- CloudWatchNetworkMonitorServiceRolePolicy
- ConfigConformsServiceRolePolicy
- CustomerProfilesServiceLinkedRolePolicy
- EC2FastLaunchServiceRolePolicy
- ElastiCacheServiceRolePolicy
- GameLiftGameServerGroupPolicy
- KeyspacesCDCServiceRolePolicy
- MemoryDBServiceRolePolicy
- NovaActServiceRolePolicy
- OpensearchIngestionSelfManagedVpcePolicy
- QAppsServiceRolePolicy
- QBusinessServiceRolePolicy
- RTBFabricServiceRolePolicy
- SMSVoiceServiceRolePolicy
- SageMakerStudioAdminIAMDefaultExecutionPolicy
- SageMakerStudioProjectRoleMachineLearningPolicy
- SageMakerStudioProjectUserRolePermissionsBoundary
- SageMakerStudioProjectUserRolePolicy
- SageMakerStudioUserIAMDefaultExecutionPolicy
Deny (Action)
None
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM