S3 Bucket Policies

7/7
FILTERS
 
S3
Require SSL (encryption in-transit) to access the S3 Bucket.
S3 Bucket Policy
A policy that denies any access to the S3 bucket that is not encrypted in-transit (uses HTTP instead of HTTPS).
API and CLI Access
Console Access
Prevent S3 Buckets and Objects from Allowing Public Access
S3 Bucket Policy
A policy that denies an S3 bucket or any uploaded object with the attribute x-amz-acl having the values public-read, public-read-write, or authenticated-read. This means authenticated users cannot change the bucket's policy to public read or upload objects to the bucket if the objects have public permissions.
API and CLI Access
Console Access
Restrict Access to Specific IP Addresses
S3 Bucket Policy
A policy that grants permissions to any user to perform any Amazon S3 operations on objects in the specified bucket. However, the request must originate from the range of IP addresses specified in the condition.
API and CLI Access
Restricting Access to a Specific HTTP Referrer
S3 Bucket Policy
A policy that allows s3:GetObject permission with a condition, using the aws:referer key, that the get request must originate from specific webpages.
Require MFA for Bucket Access
S3 Bucket Policy
A policy that denies any Amazon S3 operation on the bucket if the request is not MFA authenticated.
API and CLI Access
Console Access
MFA
Restrict S3 bucket read access to a Cloudfront origin
S3 Bucket Policy
A policy that denies any requests to read objects in an S3 bucket that don't come from a specific Cloudfront distribution. You must specify the canonical user ID for your CloudFront distribution's origin access identity.
API and CLI Access
Console Access
Grant Read-Only Permission to any Anonymous User
S3 Bucket Policy
A policy that grants the s3:GetObject permission to any public anonymous user.
API and CLI Access