Chapter 6. Securing Resources with Bucket Policies and IAM

This chapter is divided into two parts; the first part is an introduction to the access control method and the difference between resource-based policies and user policies, and the last part includes bucket policy examples and their structures based on common use cases with the following walkthroughs:

  • Walkthrough 1: To grant users bucket permissions
  • Walkthrough 2: To grant cross-account bucket permissions
  • Walkthrough 3: To grant cross-account bucket permissions to objects without ownership
  • Walkthrough 4: Bucket and user policy examples

Introduction

Amazon S3 resources consist of buckets, objects, and related subresources (such as the website configuration that we used to create a static website ...

Get Amazon S3 Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.