Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.cloudcapital.co/llms.txt

Use this file to discover all available pages before exploring further.

AWS deprecated a set of legacy IAM actions used to control access to Billing, Cost Management, and Account consoles. If your AWS account was created before March 6, 2023, you likely have policies that still use these old actions — and they need to be updated before AWS Billing Transfer will work correctly to onboard to Cloud Capital. This guide explains why the migration is required, how to check if you’re AWS IAM policies are affected, and how to complete the update using AWS’s built-in tooling.
AWS Billing Transfer requires that your IAM policies use the new fine-grained actions. Accounts with legacy aws-portal:* policies may encounter permission errors or incomplete data visibility during onboarding. Complete this migration before enabling the integration in Cloud Capital.

Background: What changed and why

AWS previously used a broad set of IAM actions under the aws-portal namespace to control access to billing and cost management features. These coarse-grained actions made it difficult to grant targeted access — for example, allowing an engineer to view cost data without also giving them access to payment methods or account settings. AWS replaced these with a new set of fine-grained IAM actions spread across multiple service prefixes:
New service prefixWhat it controls
billingBilling console, invoices, and billing data
paymentsPayment methods and preferences
invoicingInvoice configuration and delivery settings
freetierAWS Free Tier visibility
consolidatedbillingConsolidated billing for AWS Organizations
taxTax settings and documents
accountAccount-level settings and contacts
curCost and Usage Reports
purchase-ordersPurchase order management
The old aws-portal:* actions, along with certain purchase-orders actions, are retired. Policies still referencing them will eventually stop working — and some AWS features, including Billing Transfer, require the new permissions to function correctly.
If your AWS account or AWS Organization was created on or after March 6, 2023, fine-grained actions are already enforced for you. You can skip ahead to verify you’re not affected.

Checking whether you are affected

AWS provides an Affected Policies Tool directly in the Billing console. It scans your IAM policies (not SCPs) and identifies any that still reference deprecated actions.
1

Open the AWS Billing console

Navigate to https://console.aws.amazon.com/billing and sign in with an account that has billing console access.
2

Find the Affected Policies Tool

In the left navigation, go to Billing preferencesAffected Policies. If this section isn’t visible, your account may already be fully migrated.
3

Review the results

The tool lists every IAM policy that references deprecated actions. Each entry shows:
  • The policy name and ARN
  • The specific deprecated actions detected
  • A suggested updated policy you can copy directly
If the list is empty, no action is required and you’re ready to proceed with Cloud Capital onboarding.
If you manage an AWS Organization, run this check from your payer (management) account — it provides the broadest view of affected policies across the organization. Member accounts may also have their own affected policies that require separate review.

Migrating your policies

Once you’ve identified affected policies, you have two options: use the Affected Policies Tool to copy-paste updated versions, or update policies manually if you manage them in code.

Frequently asked questions

No — as long as you retain the old aws-portal:* actions in your policy during the transition, access remains uninterrupted. The migration adds new fine-grained actions alongside the existing ones; it does not remove the old ones until you’re ready.
The Affected Policies Tool only scans IAM identity-based policies. SCPs are not included in the scan. If your organization uses SCPs to restrict billing or cost management access, review those separately using the action mapping reference and update them manually if needed.
Yes, but you can get a consolidated view from your payer (management) account. For large organizations, AWS provides Bulk Policy Migrator Scripts that can help automate updates across member accounts.
You may encounter permission errors during Cloud Capital onboarding, or some cost and billing data may not flow through correctly. We recommend completing the migration before enabling the integration to ensure a smooth setup.
No — accounts created on or after that date already enforce fine-grained actions by default. The Affected Policies Tool will show an empty list, and you’re ready to proceed with Cloud Capital onboarding.

Next steps

Once your IAM policies are updated and the Affected Policies Tool shows no remaining issues, you’re ready to enable AWS Billing Transfer in Cloud Capital.

Enable AWS Billing Transfer

Connect your AWS payer account to Cloud Capital to start ingesting billing and cost data.

AWS fine-grained permissions reference

Official AWS documentation on migrating access control for Cost Management.

Official AWS reference: This guide is based on AWS’s own documentation for migrating Billing and Cost Management IAM policies. For the full action mapping and organizational migration scripts, see the AWS Cost Management migration guide and the Affected Policies Tool reference.