tag:GetResources
Literal appearances in AWS managed IAM policies. Statements that use wildcards (for example s3:*) are not counted here. This is not an IAM authorization simulation.
Policies (any)
72
Allow (Action)
72
Deny (Action)
0
NotAction
4
Index generated 4/7/2026, 3:29:24 AM. 559 policies include at least one wildcard action string (any service).
Action reference
SAR-style (unofficial)Service: Amazon Resource Group Tagging API
Access level
ReadDescription
Grants permission to return tagged or previously tagged resources in the specified AWS Region for the calling account
Allow (Action)
- AIDevOpsAgentAccessPolicy
- AIOpsAssistantPolicy
- AWSAuditManagerAdministratorAccess
- AWSBackupAdminPolicy
- AWSBackupFullAccess
- AWSBackupOperatorAccess
- AWSBackupOperatorPolicy
- AWSBackupServiceLinkedRolePolicyForBackup
- AWSBackupServiceLinkedRolePolicyForBackupTest
- AWSBackupServiceRolePolicyForBackup
- AWSCodeDeployRole
- AWSConfigRole
- AWSConfigServiceRolePolicy
- AWSConfigUserAccess
- AWSFaultInjectionSimulatorECSAccess
- AWSFaultInjectionSimulatorEKSAccess
- AWSFaultInjectionSimulatorRDSAccess
- AWSGlueConsoleFullAccess
- AWSGlueConsoleSageMakerNotebookFullAccess
- AWSIoTSiteWiseConsoleFullAccess
- AWSLambdaFullAccess
- AWSLambdaReadOnlyAccess
- AWSLambda_FullAccess
- AWSLambda_ReadOnlyAccess
- AWSManagedServices_ContactsServiceRolePolicy
- AWSNetworkFirewallServiceRolePolicy
- AWSQuickSetupSchedulerPermissionsBoundary
- AWSReachabilityAnalyzerServiceRolePolicy
- AWSResilienceHubAsssessmentExecutionPolicy
- AWSSecurityHubServiceRolePolicy
- AWSSecurityHubV2ServiceRolePolicy
- AWSServiceCatalogAppRegistryFullAccess
- AWSWellArchitectedDiscoveryServiceRolePolicy
- AWS_ConfigRole
- AmazonDataZoneEnvironmentRolePermissionsBoundary
- AmazonDataZoneProjectRolePermissionsBoundary
- AmazonDataZoneSageMakerEnvironmentRolePermissionsBoundary
- AmazonDevOpsGuruServiceRolePolicy
- AmazonDynamoDBFullAccess
- AmazonDynamoDBFullAccess_v2
- AmazonDynamoDBReadOnlyAccess
- AmazonECSInfrastructureRolePolicyForManagedInstances
- AmazonEKSServiceRolePolicy
- AmazonElasticFileSystemServiceRolePolicy
- AmazonFISServiceRolePolicy
- AmazonGrafanaCloudWatchAccess
- AmazonRDSDataFullAccess
- AmazonRedshiftFullAccess
- AmazonRedshiftQueryEditorV2FullAccess
- AmazonRedshiftQueryEditorV2NoSharing
- AmazonRedshiftQueryEditorV2ReadSharing
- AmazonRedshiftQueryEditorV2ReadWriteSharing
- AmazonRoute53FullAccess
- AmazonSSMMaintenanceWindowRole
- AmazonSSMPatchAssociation
- AmazonSSMServiceRolePolicy
- AmazonSageMakerFullAccess
- AmazonSageMakerModelRegistryFullAccess
- AmazonVPCNetworkAccessAnalyzerFullAccessPolicy
- CloudTrailEventContext
- CloudWatchApplicationSignalsServiceRolePolicy
- CloudWatchAutomaticDashboardsAccess
- CloudwatchApplicationInsightsServiceLinkedRolePolicy
- EC2ImageBuilderLifecycleExecutionPolicy
- ROSAIngressOperatorPolicy
- ROSASharedVPCRoute53Policy
- ResourceGroupsServiceRolePolicy
- ResourceGroupsTaggingAPITagUntagSupportedResources
- SageMakerStudioProjectUserRolePermissionsBoundary
- SageMakerStudioProjectUserRolePolicy
- SecretsManagerReadWrite
- SecurityAudit
Deny (Action)
Thanks to Ian McKay for iam-dataset (MIT), structured data derived from the AWS Service Authorization Reference. Not maintained by AWS and not guaranteed current. IAMTrail's managed policy archive is separate.
Definitions bundle generated 4/7/2026, 3:29:24 AM