# Update existing IAM policy in AWS

Keeping IAM policies up to date ensures that organizations can effectively leverage new AWS services and features, maintaining a secure and efficient cloud environment while embracing technological advancements.

# Update existing IAM policy

  1. Go to AWS Management Console and sign in with your account.

  2. In the top left corner, you will see services icon. Click on it, and from the options, click on the IAM option.. aws-console-home.png

  3. On the IAM Dashboard page, click on the Roles option from the left panel.

billing-and-cost-management-home.png

  1. In Search bar, enter your CloudOptimo specific IAM role name and click on that Role name.

data-export-screen.png

  1. After clicking Role name, the Role summary section opens as shown below.
    • Permission Policies - Click on the Policy.

select-cost-management-preferences-option.png

  1. On policy summary page , you will see the edit button at top right corner beside delete button. Click on the Edit button.

resource-snap-2.png

  1. The Policy editor window opens as shown below. Now you can add the new policies here.
    • After adding a new policies scroll down on same page.

resource-snap-2.png

  1. After adding new policies, the existing JSON looks like the following

resource-snap-2.png

  1. Click on Next button.

resource-snap-2.png

  1. Now you will see the Review and Save page as below. Review all policies and scroll down on same page.

resource-snap-2.png

  1. Click on Save Changes Button

resource-snap-2.png

# What is the principle behind updating existing IAM policies?

  1. Assess how well the updated IAM policy facilitates access to the necessary data for analysis.
  2. Ensure that the policy provides appropriate permissions to access all relevant data sources required for analysis..
  3. Verify that the updated policy aligns with regulatory requirements and organizational policies governing data access and usage.
  4. Evaluate the security implications of the updated policy to mitigate risks associated with unauthorized data access or breaches.

# References