IAM permissions reference
CloudFormation deployment role
The IAM principal that deploys the Uptime Scheduler CloudFormation stack needs sufficient permissions to create and manage the stack’s resources.
Lambda execution roles
The CloudFormation stack creates least-privilege IAM roles for each Lambda function. These are created automatically and do not require any action from you.
TagEventProcessor
ec2:DescribeInstancesec2:DescribeNatGatewaysrds:DescribeDBInstancesrds:ListTagsForResourceecs:DescribeServicesdynamodb:PutItem,dynamodb:GetItem,dynamodb:UpdateItemsns:Publish(infrastructure events topic)
ScheduleManager
dynamodb:GetRecords,dynamodb:GetShardIterator,dynamodb:DescribeStream,dynamodb:ListStreamsscheduler:CreateSchedule,scheduler:UpdateSchedule,scheduler:DeleteScheduleiam:PassRole(for EventBridge Scheduler execution role)sns:Publish(infrastructure events topic)
EC2ActionProcessor
ec2:StartInstances,ec2:StopInstancesec2:DescribeInstancesdynamodb:UpdateItemsqs:ReceiveMessage,sqs:DeleteMessagesns:Publish
RDSActionProcessor
rds:StartDBInstance,rds:StopDBInstancerds:DescribeDBInstancesdynamodb:UpdateItemsqs:ReceiveMessage,sqs:DeleteMessagesns:Publish
NATActionProcessor
ec2:CreateNatGateway,ec2:DeleteNatGatewayec2:DescribeNatGatewaysec2:CreateRoute,ec2:DeleteRoute,ec2:DescribeRouteTablesec2:AssociateAddress(for EIP reattachment)dynamodb:GetItem,dynamodb:PutItem,dynamodb:UpdateItemsqs:ReceiveMessage,sqs:DeleteMessagesns:Publish
ECSActionProcessor
ecs:UpdateServiceecs:DescribeServicesdynamodb:GetItem,dynamodb:UpdateItemsqs:ReceiveMessage,sqs:DeleteMessagesns:Publish