Skip to content

Conversation

goncalodasilva
Copy link
Contributor

S3 bucket policies control access to the S3 bucket and its objects, not to KMS keys. You cannot grant a bucket access to a KMS key through a bucket policy. The principal (EC2 instance/IAM role) needs access to the key, not the bucket itself.

KMS key policies are the primary way to control access to KMS keys, and to use IAM policies to control access to a KMS key, the key policy must give the account permission to use IAM policies

https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html https://docs.aws.amazon.com/kms/latest/developerguide/control-access.html

Copy link
Member

@danieldanielecki danieldanielecki left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do you mind to also fix the typo Amaon to be Amazon?

@goncalodasilva
Copy link
Contributor Author

Do you mind to also fix the typo Amaon to be Amazon?

Done

S3 bucket policies control access to the S3 bucket and its objects, not to KMS keys. You cannot grant a bucket access to a KMS key through a bucket policy. The principal (EC2 instance/IAM role) needs access to the key, not the bucket itself.

KMS key policies are the primary way to control access to KMS keys, and to use IAM policies to control access to a KMS key, the key policy must give the account permission to use IAM policies

https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html
https://docs.aws.amazon.com/kms/latest/developerguide/control-access.html
@danieldanielecki
Copy link
Member

Do you mind to also fix the typo Amaon to be Amazon?

Done

and in the table of contents? :(

Copy link
Member

@danieldanielecki danieldanielecki left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

in the table of contents, as well, please!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants