3 Answers
- Newest
- Most votes
- Most comments
1
None of the provided by you AWS managed policies: AmazonVPCFullAccess, AmazonRoute53FullAccess, ReadOnlyAccess
have the permission DeleteSecurityGroup
. You need create your own Policy, add permission DeleteSecurityGroup
and attach it to your IAM User/IAM Group/Role
0
Hello.
What are the circumstances under which access is denied?
Would it be possible for you to share a screenshot or text of the actual error message?
Basically, access denial occurs when the policy of the IAM user in use does not have enough privileges.
Are your IAM users attached to the appropriate IAM policies?
0
I had the following permission AmazonVPCFullAccess,AmazonRoute53FullAccess,ReadOnlyAccess .
answered 8 months ago
Relevant content
- asked a year ago
- asked a year ago
- asked 2 years ago
- Accepted Answerasked 3 months ago
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 7 months ago
- AWS OFFICIALUpdated 7 months ago
Hi, given your screenshot published below, Riku is 100%: you have IAM policy issue: the identity under which you try to detach the ENI doesn't have the right to change the resource (security group) linked to it.
You can see the instance owner and other details from the ENI details. Is the instance owner, etc. your AWS account ID? If the instance owner is not your AWS account ID, you may not be able to change it from the ENI screen. Changes may need to be made from the screen of the AWS service that holds the ENI.
Hi, as checked that eni instance details all the fields are being blank "-"