AWS deprecated a set of legacy IAM actions used to control access to Billing, Cost Management, and Account consoles. If your AWS account was created before March 6, 2023, you likely have policies that still use these old actions — and they need to be updated before AWS Billing Transfer will work correctly to onboard to Cloud Capital. This guide explains why the migration is required, how to check if you’re AWS IAM policies are affected, and how to complete the update using AWS’s built-in tooling.Documentation Index
Fetch the complete documentation index at: https://docs.cloudcapital.co/llms.txt
Use this file to discover all available pages before exploring further.
Background: What changed and why
AWS previously used a broad set of IAM actions under theaws-portal namespace to control access to billing and cost management features. These coarse-grained actions made it difficult to grant targeted access — for example, allowing an engineer to view cost data without also giving them access to payment methods or account settings.
AWS replaced these with a new set of fine-grained IAM actions spread across multiple service prefixes:
| New service prefix | What it controls |
|---|---|
billing | Billing console, invoices, and billing data |
payments | Payment methods and preferences |
invoicing | Invoice configuration and delivery settings |
freetier | AWS Free Tier visibility |
consolidatedbilling | Consolidated billing for AWS Organizations |
tax | Tax settings and documents |
account | Account-level settings and contacts |
cur | Cost and Usage Reports |
purchase-orders | Purchase order management |
aws-portal:* actions, along with certain purchase-orders actions, are retired. Policies still referencing them will eventually stop working — and some AWS features, including Billing Transfer, require the new permissions to function correctly.
Checking whether you are affected
AWS provides an Affected Policies Tool directly in the Billing console. It scans your IAM policies (not SCPs) and identifies any that still reference deprecated actions.Open the AWS Billing console
Find the Affected Policies Tool
Review the results
- The policy name and ARN
- The specific deprecated actions detected
- A suggested updated policy you can copy directly
Migrating your policies
Once you’ve identified affected policies, you have two options: use the Affected Policies Tool to copy-paste updated versions, or update policies manually if you manage them in code.- Using the Affected Policies Tool (recommended)
- Updating policies in code (IaC / version control)
Copy the updated policy
Sid block (prefixed AffectedPoliciesMigrator) containing the equivalent fine-grained actions.Open the policy in IAM
Edit and paste the updated policy
Repeat for all affected policies
Frequently asked questions
Will my team lose access during the migration?
Will my team lose access during the migration?
aws-portal:* actions in your policy during the transition, access remains uninterrupted. The migration adds new fine-grained actions alongside the existing ones; it does not remove the old ones until you’re ready.Does this affect Service Control Policies (SCPs)?
Does this affect Service Control Policies (SCPs)?
I manage multiple AWS accounts. Do I need to do this for each one?
I manage multiple AWS accounts. Do I need to do this for each one?
What happens if I don't migrate before enabling AWS Billing Transfer?
What happens if I don't migrate before enabling AWS Billing Transfer?
My account was created after March 6, 2023. Do I need to do anything?
My account was created after March 6, 2023. Do I need to do anything?

