mgn:StartCutover
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
1
Allow (Action)
1
Deny (Action)
0
NotAction
0
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: AWS Application Migration Service
Access level
WriteDescription
Grants permission to start cutover
Resource types
- SourceServerResource*
Dependent actions (first 30)
- ec2:AttachVolume
- ec2:AuthorizeSecurityGroupEgress
- ec2:AuthorizeSecurityGroupIngress
- ec2:CreateLaunchTemplate
- ec2:CreateLaunchTemplateVersion
- ec2:CreateSecurityGroup
- ec2:CreateSnapshot
- ec2:CreateTags
- ec2:CreateVolume
- ec2:DeleteLaunchTemplateVersions
- ec2:DeleteSnapshot
- ec2:DeleteVolume
- ec2:DescribeAccountAttributes
- ec2:DescribeAvailabilityZones
- ec2:DescribeImages
- ec2:DescribeInstanceAttribute
- ec2:DescribeInstanceStatus
- ec2:DescribeInstanceTypes
- ec2:DescribeInstances
- ec2:DescribeLaunchTemplateVersions
- ec2:DescribeLaunchTemplates
- ec2:DescribeSecurityGroups
- ec2:DescribeSnapshots
- ec2:DescribeSubnets
- ec2:DescribeVolumes
- ec2:DetachVolume
- ec2:ModifyInstanceAttribute
- ec2:ModifyLaunchTemplate
- ec2:ReportInstanceStatus
- ec2:RevokeSecurityGroupEgress
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM