Example Policies
This section provides example IAM policies for Lenses.
These are the recommended default role templates. Use them as-is or as a starting point for custom roles tailored to your organization's needs.
Administrator
Full system access with all permissions. Administrators can manage all resources, users, and system configuration. This role should be granted sparingly and only to trusted personnel.
The admin role grants unrestricted access. Consider creating more granular roles for day-to-day operations.
Developer
Create and manage data infrastructure including topics, connectors, processors, and schemas. Developers can build and deploy data pipelines but cannot manage users or system configuration.
Data Engineer
Read and write topic data, manage schemas, and create SQL processors. Data engineers focus on data transformation and pipeline development but have limited infrastructure management capabilities.
Viewer
Read-only access across all resources. Viewers can browse topics, view configurations, and monitor status but cannot make any changes. Ideal for stakeholders who need visibility without modification rights.
Viewers cannot read topic data (kafka:ReadTopicData). Add that permission explicitly if data browsing is needed.
Operator
Operational management without create/delete permissions. Operators can start, stop, scale, and monitor resources but cannot create new infrastructure or delete existing resources.
Security Administrator
IAM and security management without data access. Security admins manage users, roles, groups, service accounts, ACLs, and audit logs but cannot read or write topic data.
Governance Administrator
Approve governance requests and manage data policies. Governance admins review and approve/deny self-service requests and configure governance rules and data protection policies.
Governance admins need underlying permissions (e.g., kafka:CreateTopic) to approve requests that create resources.
Environment-Scoped Roles
The roles above grant access across all environments. To restrict access to specific environments, modify the resource patterns.
Developer for specific environment
Restrict developer access to only the us-dev environment:
Deny production access
Explicitly deny access to production environments:
Last updated
Was this helpful?

