AWS S3 Bucket Policy vs IAM - What's the Difference?

preview_player
Показать описание
S3 Bucket Policies and IAM are two methods for managing access to an S3 bucket. In this video, learn the difference between these two concepts and when to use one over the other.

📚 My Courses 📚

🎉SUPPORT BE A BETTER DEV🎉

📚 MY RECOMMENDED READING LIST FOR SOFTWARE DEVELOPERS📚

🎙 MY RECORDING EQUIPMENT 🎙

💻 MY DESKTOP EQUIPMENT 💻

🌎 Find me here:

#AWS
#S3
#Security
Рекомендации по теме
Комментарии
Автор

Be A Better Dev: Daniel, this is so timely for me! On my current project, I'm _literally_ in the middle of creating a lambda to trigger off of s3:CreateObject events which then invokes a step function! Love your explanations of AWS concepts, they're super clear and concise. ❤ AWS's IAM docs are hopeless. 😩

ropro
Автор

Very nicely explained. Thanks for the effort you have put in making such videos.

tota_trader
Автор

Thanks for the tutorial. Really helped me a lot what I wanted to do. 👍

sureshsurendran
Автор

Do you have a link to that flow chart @8:35? It's too small to read for me.

BR-lxpy
Автор

Thank you for the great video!
A question please, is it required to allow both sides (IAM Policy and S3 Bucket policy) in order to access an S3 object or is it that 1 of them is enough?

AfikAfikAfik
Автор

Thanks for this amazing tutorial. I have a question for you with respect to the cross-account S3 bucket access. If the root user on account B has got access to the S3 bucket sitting on account A then will that make any role of account B access to this bucket (on account A) if the access was given on the role by account B

Vinod_Kumar
Автор

I get a principal error when trying to add a bucket policy which gives access to a bucket from a different amazon account and role on that account. The other person does not want to assume a role I created them in my iam they just want access from their account and role added directly on the bucket policy

frzen
Автор

So do bucket policies override IAM policies?

mbhhbgo
Автор

Oh Canada! Is there really a “zed” in “reZources”? 😊

dlwiii
Автор

I have a question, but first, very good. I was never told before that the principal field goes just with S3 policies.
On to the question, if we're allowed to act on a bucket, can't we operate on its objects as well? In your example you gave access to both bucket and objects.

renejacques
Автор

If i give permission to s3 bucket in bucket policy to a user but no in IAM policy, can the user access the s3 bucket?

raghuboyapati
Автор

Hello. I want to deny GetObject for all users in minio, but it doesn't work. Here is a bucket policy. {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Deny",
"Principal": {
"AWS": [
"*"
]
},
"Action": [
"s3:GetObject"
],
"Resource": [
"arn:aws:s3:::my-bucket/*"
]
}
]
} And user has readwrite policy. {
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:*"
],
"Resource": [
"arn:aws:s3:::*"
]
}
]
}.

olduniverse