Amazon S3 is designed to be secure by default: All newly created buckets are private by default. Only the bucket and object owners originally have access to Amazon S3 resources they create.
Access Control to S3 Resources
Access control to your bucket can be setup using:
-
IAM Policies
-
Can grant IAM users fine-grained control to their Amazon S3 bucket or objects while also retaining full control over everything the users do
-
-
Bucket policies
-
Can define rules for all requests to their S3 resources, such as granting write privileges to a subset of S3 resources.
-
Can also restrict access based on an aspect of the request, such as HTTP referrer and IP address.
-
-
Access control lists
-
Can grant specific permissions (i.e. READ, WRITE, FULL_CONTROL) to specific users for an individual bucket or object.
-
-
Query string authentication
-
Can create a URL to an Amazon S3 object which is only valid for a limited time.
-
S3 Data Protection Features
S3 provides following features for data protection:
-
Amazon S3 is designed to sustain the concurrent loss of data in two facilities.
-
When processing a request to store data, the service will redundantly store your object across multiple facilities before returning SUCCESS.
-
Amazon S3 also regularly verifies the integrity of your data using checksums and repairs any corruption using redundant data. S3 uses a combination of Content-MD5 checksums and cyclic redundancy checks (CRCs).
-
Once you enable Versioning for a bucket, Amazon S3 preserves existing objects anytime you perform a PUT, POST, COPY, or DELETE operation on them.
-
Only the owner of an Amazon S3 bucket can permanently delete a version.
-
Versioning’s MFA Delete capability, which uses multi-factor authentication, can be used to provide an additional layer of security.
-
Additional Notes - Security
-
S3 buckets can be configured to log access logs for data access auditing. This can be done to another bucket as well.
-
Bucket policies can allow, mandate or forbid encryption at bucket or object level.
-
You can limit access to your bucket from a specific Amazon VPC Endpoint or a set of endpoints using Amazon S3 bucket policies. S3 bucket policies now support a condition, aws:sourceVpce, that you can use to restrict access.
-
Note: An Amazon VPC Endpoint for Amazon S3 is a logical entity within a VPC that allows connectivity only to S3. The VPC Endpoint routes requests to S3 and routes responses back to the VPC.
-
References:
- heartin's blog
- Log in or register to post comments
Comments
Good, what is Forbid
Good, what is Forbid Encryption?