Actions Resource Types Condition Keys

Actions, Resources, and Condition Keys for AWS Cost Explorer Service

AWS Cost Explorer Service (service prefix: ce ) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

References:

Actions Defined by AWS Cost Explorer Service

You can specify the following actions in the Action element of an IAM policy statement. Use policies to grant permissions to perform an operation in AWS. When you use an action in a policy, you usually allow or deny access to the API operation or CLI command with the same name. However, in some cases, a single action controls access to more than one operation. Alternatively, some operations require several different actions.

The Resource Types column indicates whether each action supports resource-level permissions. If there is no value for this column, you must specify all resources ("*") in the Resource element of your policy statement. If the column includes a resource type, then you can specify an ARN of that type in a statement with that action. Required resources are indicated in the table with an asterisk (*). If you specify a resource-level permission ARN in a statement using this action, then it must be of this type. Some actions support multiple resource types. If the resource type is optional (not indicated as required), then you can choose to use one but not the other.

For details about the columns in the following table, see The Actions Table .

Actions Description Access Level Resource Types (*required) Condition Keys Dependent Actions
CreateCostCategoryDefinition Grants permission to create a new Cost Category with the requested name and rules. Write
DeleteCostCategoryDefinition Grants permission to delete a Cost Category. Write
DescribeCostCategoryDefinition Grants permission to retrieve descriptions such as the name, ARN, rules, definition, and effective dates of a Cost Category. Read
GetCostAndUsage Grants permission to retrieve the cost and usage metrics for your account. Read
GetCostAndUsageWithResources Grants permission to retrieve the cost and usage metrics with resources for your account. Read
GetCostForecast Grants permission to retrieve a cost forecast for a forecast time period. Read
GetDimensionValues Grants permission to retrieve all available filter values for a filter for a period of time. Read
GetReservationCoverage Grants permission to retrieve the reservation coverage for your account. Read
GetReservationPurchaseRecommendation Grants permission to retrieve the reservation recommendations for your account. Read
GetReservationUtilization Grants permission to retrieve the reservation utilization for your account. Read
GetRightsizingRecommendation Grants permission to retrieve the rightsizing recommendations for your account. Read
GetSavingsPlansCoverage Grants permission to retrieve the Savings Plans coverage for your account. Read
GetSavingsPlansPurchaseRecommendation Grants permission to retrieve the Savings Plans recommendations for your account. Read
GetSavingsPlansUtilization Grants permission to retrieve the Savings Plans utilization for your account. Read
GetSavingsPlansUtilizationDetails Grants permission to retrieve the Savings Plans utilization details for your account. Read
GetTags Grants permission to query tags for a specified time period. Read
GetUsageForecast Grants permission to retrieve a usage forecast for a forecast time period. Read
ListCostCategoryDefinitions Grants permission to retrieve names, ARN, and effective dates for all Cost Categories. List
UpdateCostCategoryDefinition Grants permission to update an existing Cost Category. Write

Resource Types Defined by AWS Cost Explorer Service

AWS Cost Explorer Service does not support specifying a resource ARN in the Resource element of an IAM policy statement. To allow access to AWS Cost Explorer Service, specify “Resource”: “*” in your policy.

Condition Keys for AWS Cost Explorer Service

Cost Explorer Service has no service-specific context keys that can be used in the Condition element of policy statements. For the list of the global context keys that are available to all services, see Available Keys for Conditions in the IAM Policy Reference .