Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

AWS S3 Bucket Policy Gone Wrong [Comic]

DZone's Guide to

AWS S3 Bucket Policy Gone Wrong [Comic]

From S3 Bucket to Pandora's Box in one simple step.

· Cloud Zone ·
Free Resource

See why enterprise app developers love Cloud Foundry. Download the 2018 User Survey for a snapshot of Cloud Foundry users’ deployments and productivity.

This “Curious Dev” was trying to play around with AWS S3 bucket policy.
Image title

*Statutory warning: Curiosity kills. Never try this stunt while at work. Organizations as big as U.S. Pentagon have faced the music because of this.


The ‘Principal’ element in the policy code specifies the user, account, service, or other entity that is allowed or denied access to a resource residing in AWS S3 bucket. There have been several cases reported across the world about how S3 buckets lead to data leakage. In most cases, that ‘star’ is the culprit.

For more information, visit AWS’ Principal page in the IAM User Guide. To know more about how to restrict Amazon S3 Bucket access to a specific IAM role, click here.

Cloud Foundry saves app developers $100K and 10 weeks on average per development cycle. Download the 2018 User Survey for a snapshot of Cloud Foundry users’ deployments and productivity. Find out what people love about the industry standard cloud application platform.

Topics:
aws s3 ,aws ,cloud security ,privacy policy ,data security breach ,public cloud ,public cloud security ,cloud storage ,iam

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}