Create an IAM Role

Time Estimate: 5 - 10 minutes

In this section you will create a suitable IAM role that will give the approriate execution priviliges to your S3 Processor Lambda function.

  1. Make sure you are in N. Virginia region. Look for the Identity and Access Management (IAM) service in the AWS Management console and click on the highlighted result to access the service.

  2. Once you have accessed the IAM service go to the Roles section as shown below and click Create role:

    Create Role
  3. Select Lambda like below and click Next:Permissions:

    Lambda Trust
  4. Select LambdaBasicExecutionPolicy and then select Create policy. This action should open a new tab where you can create the IAM policy.

    Create Policy
  5. Copy the IAM policy below after populating your SQS and DynamoDB ARNs that you took a note of in previous steps ***(REPLACE WITH YOUR OWN DOCUMENTS TABLE ARN, REPLACE WITH YOUR OWN SQS ARN)***

    "Version": "2012-10-17",
    "Statement": [
            "Action": [
            "Resource": [
            "Effect": "Allow"
            "Action": [
            "Resource": "REPLACE WITH YOUR OWN SQS ARN",
            "Effect": "Allow"
  1. Then paste the policy in the Json section as indicated below:

    Policy Json
  2. Click review policy and you should see the following screen. Give the policy a name like in the screeshot below and click Create policy.

    Review policy
  3. As soon as you create the IAM policy go back to your original tab to finish the creation of the IAM Role. Find the new policy you just created and attach this to your role. If the new policy does not appear in your search click the refresh button and search again. After you select the newly created policy click Next:tags

    Policy Permissions
  4. Click Next:review in the next screen.

  5. Enter a role name and click Create role.

Create Role Final