User guide

The following table shows examples of ARNs for Amazon Redshift resources that have an AWS account
of 123456789012, that were created in the US East (Northern Virginia) region, and that have a resource
name that begins with "my":
Sample ARNResource Type
arn:aws:redshift:us-east-1:123456789012:cluster:my-clusterCluster
arn:aws:redshift:us-east-1:123456789012:securitygroup:my-security-groupCluster security group
arn:aws:redshift:us-east-1:123456789012:securitygroupingress:my-security-
group/cidrip/10.0.0.0/16
CIDR/IP
arn:aws:redshift:us-east-1:123456789012:securitygroupingress:my-security-
group/ec2securitygroup/234567890123/sg-123a4567
EC2 security group
arn:aws:redshift:us-east-1:123456789012:hsmclientcert:my-hsm-certHSM client certificate
arn:aws:redshift:us-east-1:123456789012:hsmconfiguration:my-hsm-config-
uration
HSM configuration
arn:aws:redshift:us-east-1:123456789012:parametergroup:my-param-grpParameter group
arn:aws:redshift:us-east-1:123456789012:snapshot:myCluster/my-snap-
shot20130807
Snapshot
arn:aws:redshift:us-east-1:123456789012:subnetgroup:my-subnet-10Subnet group
Following are examples of ARNs for different sets of snapshots:
All snapshots created from the cluster my-cluster:
arn:aws:redshift:us-east-1:123456789012:snapshot:my-cluster/*
All snapshots whose name starts with my-snapshot:
arn:aws:redshift:us-east-1:123456789012:snapshot:*/my-snapshot*
Example Policies for Amazon Redshift
This section provides example IAM policies that illustrate how to grant a user permission to perform
specific Amazon Redshift actions, and how to specify the resources those actions can be used on.You
can attach these policies to a user or group for which you want to grant access permissions.
API Version 2012-12-01
121
Amazon Redshift Management Guide
Example Policies for Amazon Redshift