I'm creating a Lambda function in AWS with an execution role that allows access to Step functions, Cloudwatch, SES and SNS. This is what the role looks like:
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents"
],
"Resource": "arn:aws:logs:*:*:*",
"Effect": "Allow"
},
{
"Action": [
"ses:*",
"states:*",
"sns:*"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
I would expect to see something like this:
But instead I see non of the permissions show up.

In IAM I also see a problem pop up: "This policy defines some actions, resources, or conditions that do not provide permissions. To grant access, policies must have an action that has an applicable resource or condition." Perhaps this has to do with it?


