Configuring Security layer of Storage for Read-Only Access
OBJECTIVE This presentation will discuss the Capstone project details on “Configuring Security layer of Storage for Read-Only Access.” 2
3 Security to the storage of the infrastructure Accessibility to the authorised users only Data manipulation is restricted Data encryption provides enhanced security to data Very fast read-write access from the storage to the end user Solutions delivered by the Project-
Introduction Amazon Simple Storage Service (S3) is a highly scalable, secure and reliable cloud storage service offered by Amazon Web Services (AWS). It allows users to store and retrieve any amount of data from anywhere on the web. S3 Bucket Policies are an essential aspect of managing access control to S3 buckets. S3 bucket policies allow you to control access to your S3 resources at the bucket level. 4
Understanding S3 Bucket Policies S3 Bucket Policies are JSON (JavaScript Object Notation) documents that define permissions for buckets and objects. These policies can be used to control access to buckets and objects, including granting read, write, and delete permissions. By default, S3 buckets and objects are private, meaning only the bucket owner has access to them. However, bucket owners can use bucket policies to grant access permissions to other AWS accounts or to make objects publicly accessible . 5
How bucket policies are used to control access to S3 resources? Defining Permissions Granular Control Cross-account access Fine-Grained Access Control Integration with IAM policies Security and compliance 6
7 Steps to create S3 bucket policy-
S3 BUCKETS 8
9 BUCKET POLICY FOR RESTRICTED ACCESS
10 USER-1 ACCESS
USER-2 NO PERMISSION 11
Iam users with appropriate permissions can read designated files from the s3 bucket Expected output
In this project ,we have learned how to configure an S3 bucket policy for read-only access. By following these steps, we can effectively control access to your S3 resources and ensure that users or applications only have the necessary permissions to retrieve objects without the ability to modify or delete data maintaining the integrity and confidentiality of your data. 13