Information
AWS provides a Support Center that can be used for incident notification and response, as well as technical support and customer service. Create an IAM role with the appropriate policy assigned to allow authorized users to manage incidents with AWS Support.
Following the principle of least privilege, an IAM role should be used with a scoped policy to allow access to AWS Support. This ensures only authorized users can manage support cases without requiring broad administrative access.
Solution
From Console:
- Sign in to the AWS Management Console and open the IAM console
- Navigate to Roles
- Click Create role
- Configure the trusted entity (e.g., your AWS account or identity provider)
- Attach the AWSSupportAccess policy
- Complete role creation
- Assign the role to appropriate users or groups
From Command Line:
- Create a trust policy (example):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::<account-id>:root"
},
"Action": "sts:AssumeRole"
}
]
}
- Create the role:
aws iam create-role --role-name <role-name> --assume-role-policy-document file://trust-policy.json
- Attach the AWS Support policy:
aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/AWSSupportAccess --role-name <role-name>
Impact:
Without a dedicated support role, access to AWS Support may require overly permissive roles, increasing the risk of excessive access and reducing separation of duties.