eks:ListNodegroups
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
11
Allow (Action)
11
Deny (Action)
0
NotAction
0
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: Amazon Elastic Kubernetes Service
Access level
ListDescription
Grants permission to list the Amazon EKS nodegroups in your AWS account (in the specified or default region) attached to given cluster
Resource types
- cluster*
Allow (Action)
- AWSBackupServiceLinkedRolePolicyForBackup
- AWSBackupServiceRolePolicyForBackup
- AWSConfigRole
- AWSConfigServiceRolePolicy
- AWSResilienceHubAsssessmentExecutionPolicy
- AWSResourceExplorerServiceRolePolicy
- AWS_ConfigRole
- AmazonEKSMCPReadOnlyAccess
- CloudWatchApplicationInsightsFullAccess
- CloudwatchApplicationInsightsServiceLinkedRolePolicy
- ViewOnlyAccess
Deny (Action)
NotAction
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM