Updated on 2025-11-06 GMT+08:00

Cost Center

IAM provides system-defined identity policies to define common actions supported by cloud services. You can also create custom identity policies using the actions supported by cloud services for more refined access control.

In addition to IAM, the Organizations service also provides service control policies (SCPs) for access control.

SCPs do not actually grant any permissions to a principal. They only set the permissions boundary for the principal. When SCPs are attached to a member account or an organizational unit (OU), they do not directly grant permissions to that member account or OU. Instead, the SCPs just determine what permissions are available for that member account or the member accounts under that OU. The granted permissions can be applied only if they are allowed by the SCPs.

To learn more about how IAM policies are different from Organizations SCPs, see What Are the Differences Between IAM Policies and Organizations SCPs?

This section describes the elements used by IAM custom identity policies and Organizations SCPs. The elements include actions, resources, and conditions.

Actions

Actions are specific operations that are allowed or denied in an identity policy.

  • The Access Level column describes how the action is classified (such as list, read, or write). This classification helps you understand the level of access that an action grants when you use it in a policy.
  • The Resource Type column indicates whether the action supports resource-level permissions.
    • You can use a wildcard (*) to indicate all resource types. If this column is empty (-), the action does not support resource-level permissions and you must specify all resources ("*") in your identity policy statements.
    • If this column includes a resource type, you must specify the URN in the Resource element of your statements.
    • Required resources are marked with asterisks (*) in the table. If you specify a resource in a statement using this action, then it must be of this type.

    For details about the resource types defined by Cost Center, see Resources.

  • The Condition Key column contains keys that you can specify in the Condition element of an identity policy statement.
    • If the Resource Type column has values for an action, the condition key takes effect only for the listed resource types.
    • If the Resource Type column is empty (-) for an action, the condition key takes effect for all resources that action supports.
    • If the Condition Key column is empty (-) for an action, the action does not support any condition keys.

    For details about the condition keys defined by Cost Center, see Conditions.

  • The Alias column lists the policy actions that are configured in identity policies. With these actions, you can use APIs for policy-based authorization. For details, see Policies and Identity Policies.

The following table lists the actions that you can define in identity policy statements for Cost Center.

Table 1 Actions supported by Cost Center

Action

Description

Access Level

Resource Type (*: required)

Condition Key

Alias

costCenter:costAnalysis:listCosts

Grants permission to view cost analyses.

read

-

-

bss:costanalysis:view

costCenter:costAnalysis:configReport

Grants permission to manage cost reports, including creating, modifying, and deleting custom reports.

write

-

-

bss:costreport:update

costCenter:costAnalysis:listReports

Grants permission to view a list of cost reports.

read

-

-

bss:costreport:view

costCenter:costDetail:listCostDetails

Grants permission to view cost details.

read

-

-

bss:costanalysis:view

costCenter:budget:configBudget

Grants permission to manage budgets, including creating, modifying, and deleting budgets.

write

-

-

bss:budget:update

costCenter:budget:viewBudget

Grants permission to view budget information, including the budget list and budget details.

read

-

-

bss:budget:view

costCenter:budget:deleteBudgetReport

Grants permission to delete a budget report.

write

-

-

bss:budgetreport:delete

costCenter:budget:configBudgetReport

Grants permission to add and modify a budget report.

write

-

-

bss:budgetreport:update

costCenter:budget:viewBudgetReport

Grants permission to view budget reports, including the report list and details.

read

-

-

bss:budgetreport:view

costCenter:costAnomalyDetection:deleteMonitor

Grants permission to delete a cost monitor.

write

-

-

bss:monitor:delete

costCenter:costAnomalyDetection:configMonitor

Grants permission to add and edit a cost monitor.

write

-

-

bss:monitor:update

costCenter:costAnomalyDetection:viewMonitor

Grants permission to view cost monitors and anomalies.

read

-

-

bss:monitor:view

costCenter:costAnomalyDetection:configMonitorAlert

Grants permission to configure alerting for cost anomalies.

write

-

-

bss:monitoralert:update

costCenter:costAnomalyDetection:viewMonitorAlert

Grants permission to view cost anomaly alerts.

read

-

-

bss:monitoralert:view

costCenter:recommendation:viewRecommendationSummary

Grants permission to view the summary of cost optimization recommendations.

read

-

-

bss:recommendation:view

costCenter:recommendation:viewRecommendationSubscription

Grants permission to query subscriptions to cost optimization recommendations.

read

-

-

bss:recommendationsub:view

costCenter:recommendation:configRecommendationSubscription

Grants permission to configure or delete subscriptions to cost optimization recommendations.

write

-

-

bss:recommendationsub:update

costCenter:recommendation:viewYearlyMonthlyRecommendation

Grants permission to view the cost optimization option of changing pay-per-use to yearly/monthly.

read

-

-

bss:costoptimization:view

costCenter:costTag:updateStatus

Grants permission to activate or deactivate cost tags.

write

-

-

bss:costtag:update

costCenter:costTag:listCostTags

Grants permission to view cost tags.

read

-

-

bss:costtag:view

costCenter:costCategory:deleteCostCategory

Grants permission to delete a cost category.

write

-

-

bss:costunit:delete

costCenter:costCategory:configCostCategory

Grants permission to configure cost categories, including creating and editing cost categories.

write

-

-

bss:costunit:update

costCenter:costCategory:viewCostCategory

Grants permission to view cost category information, including the cost category list and the details of each cost category.

read

-

-

bss:costunit:view

costCenter:savingsPlans:viewSavingsPlansAnalysis

Grants permission to view the analysis of savings plan utilization and coverage.

read

-

-

bss:savingsplan:analysis

costCenter:reserveInstance:viewRIAnalysis

Grants permission to view the analysis of reserved instance utilization and coverage.

read

-

-

bss:riusageanalysis:view

costCenter:savingsPlans:viewSavingsPlans

Grants permission to view savings plans.

read

-

-

bss:savingsplan:view

costCenter:recommendation:viewSavingsPlansRecommendation

Grants permission to view savings plans purchase recommendations.

read

-

-

bss:savingsplan:suggest

costCenter::updateCostConfig

Grants permission to enable Cost Center functions.

write

-

-

bss:costpreferences:update

costCenter:preference:delete

Grants permission to disable Cost Center functions.

write

-

-

bss:costpreferences:delete

costCenter:costdetailreport:viewReportTask

Grants permission to view the task list for exporting cost details to OBS.

read

-

-

bss:costdetailreport:view

costCenter:costdetailreport:configReportTask

Grants permission to create, modify, or delete the tasks of exporting cost details to OBS.

write

-

-

bss:costdetailreport:update

costCenter:helper:listCostAllocations

Grants permission to view the percentage of allocated costs.

list

-

-

bss:costhelper:viewcostallocations

costCenter:helper:viewCostRating

Grants permission to view cost allocation maturity rating.

read

-

-

bss:costhelper:viewcostrating

costCenter:costAnomalyDetection:provideFeedback

Grants permission to provide feedback on cost anomalies.

read

-

-

-

For details about the relationship between Cost Center APIs and actions, see Customer Operations.

Resources

Cost Center does not support resource-level authorization. To allow access to Cost Center, use a wildcard (*) in the Resource element of the identity policy, indicating that the policy will be applied to all resources.

Conditions

Cost Center does not support service-specific condition keys in identity policies. It can only use global condition keys applicable to all services. For details, see Global Condition Keys.