AWS S3 cross account access with EC2 and IAM role profile | Fine grained control with Bucket Policy

preview_player
Показать описание
Hello Dear All, my name is Amit. I am here to give some tips and tricks about cloud learning and some day to day problem solving methods. I'm an professional cloud engineer, working in this fields for 12+ years.
If you have any queries regarding AWS issues... feel free to reach out to me.

In this video, I have discussed AWS S3 cross account access with an EC2 instance.

S3 cross-account access can be useful in a variety of scenarios, including:

Sharing data between AWS accounts: If you have multiple AWS accounts within your organization, you may want to share data between them. S3 cross-account access allows you to do this securely and easily, without having to copy data between accounts or use unsecure methods of transferring data.
Multi-tenant applications: If you are building a multi-tenant application, where each tenant has their own AWS account, you may want to store data for all tenants in a single S3 bucket. S3 cross-account access allows each tenant to securely access their own data in the shared bucket, without being able to access data belonging to other tenants.
Third-party access: If you want to give a third-party access to your S3 bucket, for example, a consultant or vendor, S3 cross-account access allows you to do so without having to share your AWS account credentials. You can give the third-party access to a specific IAM role, which only grants them access to the S3 bucket and nothing else.
Disaster recovery: S3 cross-account access can also be used for disaster recovery purposes. You can store backups of your data in an S3 bucket in another AWS account, so that in the event of a disaster, you can quickly recover your data without having to rely on your own account, which may be affected by the disaster.
Compliance requirements: If you have compliance requirements that require you to store data in a separate AWS account from where it was generated or used, S3 cross-account access allows you to meet these requirements easily and securely. You can store the data in a separate account and grant access to users or resources in the account where it is needed.

#aws #amazonwebservices #software #softwareengineer #developers #clouds #cloudengineer #cloudcomputing #systemdesign #database #programming #fullstack #cloudsecurity #security #fullstacksoftwareengineering #itindustry #engineering #engineer #beyondthecloud #AWSSystemsmanager #AWSdocuments #AWSautomation #s3 #S3sucurity #yamlfile #jsontemplate #python #pythonprogramming #awsec2 #awsec2security #ec2security #instancemetadata #ec2 #awslambda #awsconfig #cloudwatch #dynamodb #awsiam #boto3 #cdk #infrastructure #insfrastructureascode #python #sqs #serverless #sam #awssam #docker #dockercontainer #java

@BeABetterDev @AWSTutorialsOnline @cluut @TinyTechnicalTutorials @BlockExplorerMedia @nickchapsas @itversity @TechwithLucy @Intellipaat @knowledgeindia @SimplilearnOfficial @TechnicalGuftgu @MachineLearningHub @edurekaIN @in28minutes @CodeWithHarry @QuickSupport @byluckysir
Рекомендации по теме
Комментарии
Автор

Please provide your valuable feedback in the comment section. Please like share and subscribe for more upcoming content.

beyondthecloud
Автор

Hi, does profile name should be same as role or anything like that? I am following your tutorial but when I try to verify after creating profile, it days the config profile couldn't find.

vaibhavjainin
Автор

I have account A that has ec2 and in account B i have s3 and amazon connect. From ec2 i can access the s3 bucket but when i do pause and resume recording it says donot have access for amazon connect. But s3 cross account is working

ammarkhalid