You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
S3 bucket policies control access to the S3 bucket and its objects, not to KMS keys. You cannot grant a bucket access to a KMS key through a bucket policy. The principal (EC2 instance/IAM role) needs access to the key, not the bucket itself.
KMS key policies are the primary way to control access to KMS keys, and to use IAM policies to control access to a KMS key, the key policy must give the account permission to use IAM policies
https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.htmlhttps://docs.aws.amazon.com/kms/latest/developerguide/control-access.html
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3668,11 +3668,11 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
3668
3668
3669
3669
**[⬆ Back to Top](#table-of-contents)**
3670
3670
3671
-
### An application running on Amazon EC2 instances must access objects within an Amaon S3 busket that are encrypted using server-side encryption using AWS KMS encryption keys (SSE-KMS). The application must have access to the customer master key (CMK) to decrypt the objects. Which combination of steps will grant the application access? (Select TWO)
3671
+
### An application running on Amazon EC2 instances must access objects within an Amazon S3 busket that are encrypted using server-side encryption using AWS KMS encryption keys (SSE-KMS). The application must have access to the customer master key (CMK) to decrypt the objects. Which combination of steps will grant the application access? (Select TWO)
3672
3672
3673
-
-[x] Write an S3 bucket policy that grants the bucket access to the key.
3673
+
-[] Write an S3 bucket policy that grants the bucket access to the key.
3674
3674
-[x] Grant access to the key in the IAM EC2 role attached to the application's EC2 instances.
3675
-
-[] Write a key policy that enables IAM policies to grant access to the key.
3675
+
-[x] Write a key policy that enables IAM policies to grant access to the key.
3676
3676
-[ ] Grant access to the key in the S3 bucket's ACL.
3677
3677
-[ ] Create a Systems Manager parameter that exposes the KMS key to the EC2 instances.
0 commit comments