By using AWS re:Post, you agree to the Terms of Use
/IAM permissions required for rds:RestoreDBClusterToPointInTime/

IAM permissions required for rds:RestoreDBClusterToPointInTime


Hi there,

I am trying to figure out the required permissions for a role to call rds:RestoreDBClusterToPointInTime. gives me some clue but I am not sure what I came up with is safe. I am trying to clone an Aurora MySQL 2 cluster. Via RDS API, I use rds:RestoreDBClusterToPointInTime and then rds:CreateDBInstance. By try and fail, I got it working with the policy expcert below:

      Effect = "Allow"
      Action = [
      Resource = [

Where I am uncertain is how can we make rds:RestoreDBClusterToPointInTime one way. That is, being able to limit what is the source and what is the destination. It looks like both source and destination clusters must be in the Resource block. Therefore, we can't limit what cluster is source and what cluster is destination. Is there a way to do so?

1 Answers


From the description, it looks like you want to use RDS API RestoreDBClusterToPointInTime to restore a cluster to a specific time in the past to be a new stand alone cluster.

You want to know how to make the rds: RestoreDBClusterToPointInTime one way by defining source and target policy. Correct me if I understand wrong.

Based on what I have researched so far, we do not have a way to define such source and target in the policy. One question I have is that when restore from a source cluster to be a new cluster, target should have not been created right? Thus there is only source need access, for the target it is creating a new cluster.

If above is correct then you might be able to define the policy separately.

For example:

For action: "rds:CreateDBInstance", attach only resources needed to be attached, you may exclude the source cluster as you only need to restore from it.

For action: "rds:RestoreDBClusterToPointInTime", attach only the instance that you need to restore from.

You may also add tag to the cluster and define it in the policy.

Some links I found helpful:

[] Amazon RDS identity-based policy examples -

[] Controlling access to AWS resources using tags -

[] Amazon RDS identity-based policy examples -

Best practice would be Grant least privilege following:

[] Security best practices in IAM - Grant least privilege -

answered 5 months ago

You are not logged in. Log in to post an answer.

A good answer clearly answers the question and provides constructive feedback and encourages professional growth in the question asker.

Guidelines for Answering Questions