Created
April 21, 2018 02:11
-
-
Save iandees/26c61b7f1e9a51dae91be41d53fc06d3 to your computer and use it in GitHub Desktop.
Minimum S3 policy required for awscli s3 sync to work.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Sid": "VisualEditor0", | |
"Effect": "Allow", | |
"Action": "s3:ListObjects", | |
"Resource": "*" | |
}, | |
{ | |
"Sid": "VisualEditor1", | |
"Effect": "Allow", | |
"Action": [ | |
"s3:PutObject", | |
"s3:GetObject", | |
"s3:PutObjectAcl" | |
], | |
"Resource": "arn:aws:s3:::bucket-name/*" | |
}, | |
{ | |
"Sid": "VisualEditor2", | |
"Effect": "Allow", | |
"Action": "s3:ListBucket", | |
"Resource": "arn:aws:s3:::bucket-name" | |
} | |
] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Here is what I use in 2023. The statements are generated with help from
policy_sentry
, but equally you chould use AWS's IAM Access Analyzer.