An EFS Backup Policy fails with the message:
User: arn:aws:sts::<id>:assumed-role/VEEAM-BACKUP-FOR-AWS-IAM-ROLE-NAME/VeeamBackupSession_<guid> is not authorized to perform: backup:DeleteRecoveryPoint on resource: arn:aws:backup:AWS-REGION:<id>:recovery-point:<guid> with an explicit deny in a resource-based policy
In alignment with AWS documentation, we advise creating a new Backup Vault to store the Veeam Backup for AWS EFS Recovery Points, because a new Backup Vault doesn't have a default Access Policy.
Reference: Veeam Backup for AWS - EFS Backup IAM Role Permissions
As indicated in the Amazon AWS documentation:
Your account will always have a default backup vault. If you require different encryption keys or access policies for different groups of backups, you can create multiple backup vaults.
Furthermore, the Create Amazon EFS automatic backups documentation states:
The Amazon EFS automatic backup vault aws/efs/automatic-backup-vault is reserved for those automatic backups only. If you use it as a destination for other backup plans, you will receive an "insufficient privileges" error.
If this KB article did not resolve your issue or you need further assistance with Veeam software, please create a Veeam Support Case.
To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.
This form is only for KB Feedback/Suggestions, if you need help with the software open a support case