ec2:CreateSnapshot
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
26
Allow (Action)
26
Deny (Action)
0
NotAction
0
Index generated 5/22/2026, 8:10:29 PM. 562 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: Amazon EC2
Access level
WriteDescription
Grants permission to create a snapshot of an EBS volume and store it in Amazon S3
Resource types
- snapshot*
- volume*
Dependent actions
- ec2:CreateTags
Allow (Action)
- AWSApplicationMigrationEC2Access
- AWSApplicationMigrationReplicationServerPolicy
- AWSApplicationMigrationServiceRolePolicy
- AWSBackupServiceRolePolicyForBackup
- AWSDataLifecycleManagerServiceRole
- AWSElasticBeanstalkCustomPlatformforEC2Role
- AWSElasticDisasterRecoveryConsoleFullAccess
- AWSElasticDisasterRecoveryConsoleFullAccess_v2
- AWSElasticDisasterRecoveryReplicationServerPolicy
- AWSElasticDisasterRecoveryServiceRolePolicy
- AWSOpsWorksCMServiceRole
- AmazonEBSCSIDriverEKSClusterScopedPolicy
- AmazonEBSCSIDriverPolicy
- AmazonEBSCSIDriverPolicyV2
- AmazonEKSBlockStoragePolicy
- AmazonEKSBlockStoragePolicyV2
- AmazonGuardDutyMalwareProtectionServiceRolePolicy
- AmazonRDSCustomInstanceProfileRolePolicy
- AmazonRDSCustomServiceRolePolicy
- CloudWatchEventsBuiltInTargetExecutionAccess
- CloudWatchEventsServiceRolePolicy
- ComputeOptimizerAutomationServiceRolePolicy
- EC2FastLaunchServiceRolePolicy
- EC2InstanceProfileForImageBuilder
- ROSAAmazonEBSCSIDriverOperatorPolicy
- SystemAdministrator
Deny (Action)
None
NotAction
None
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 5/22/2026, 8:10:29 PM