RDS Backup IAM Role Permissions

In this article

    Veeam Backup for AWS uses RDS Backup Policy IAM roles to perform the following operations:

    • To enumerate  resources added to a backup policy.
    • To create cloud-native snapshots of RDS instances protected by the policy.
    • To create snapshot replicas, and so on.

    To perform these operations, IAM roles specified in the backup policy settings must have the following permissions:

    {

       "Version": "2012-10-17",

       "Statement": [

           {

               "Action": [

                   "events:DeleteRule",

                   "events:DescribeRule",

                   "events:ListTargetsByRule",

                   "events:PutRule",

                   "events:PutTargets",

                   "events:RemoveTargets",

                   "iam:GetContextKeysForPrincipalPolicy",

                   "iam:GetRole",

                   "iam:SimulatePrincipalPolicy",

                   "kms:CreateGrant",

                   "kms:DescribeKey",

                   "kms:GetKeyPolicy",

                   "kms:ListKeys",

                   "rds:AddTagsToResource",

                   "rds:CopyDBSnapshot",

                   "rds:CreateDBSnapshot",

                   "rds:DeleteDBSnapshot",

                   "rds:DescribeDBInstances",

                   "rds:DescribeDBSnapshots",

                   "rds:ListTagsForResource",

                   "rds:ModifyDBSnapshotAttribute",

                   "sns:CreateTopic",

                   "sns:DeleteTopic",

                   "sns:ListSubscriptionsByTopic",

                   "sns:ListTopics",

                   "sns:SetTopicAttributes",

                   "sns:Subscribe",

                   "sns:Unsubscribe",

                   "sqs:CreateQueue",

                   "sqs:DeleteMessage",

                   "sqs:DeleteQueue",

                   "sqs:ListQueues",

                   "sqs:ReceiveMessage",

                   "sqs:SendMessage",

                   "sqs:SetQueueAttributes"

               ],

                         "Resource": "*",

                         "Effect": "Allow"

             }

       ]

    }