AWS S3 Bucket Policy Gone Wrong [Comic]
From S3 Bucket to Pandora's Box in one simple step.
Join the DZone community and get the full member experience.Join For Free
Statutory warning: Curiosity kills. Never try this stunt while at work. Organizations as big as U.S. Pentagon have faced the music because of this.
The ‘Principal’ element in the policy code specifies the user, account, service, or other entity that is allowed or denied access to a resource residing in AWS S3 bucket. There have been several cases reported across the world about how S3 buckets lead to data leakage. In most cases, that ‘star’ is the culprit.
For more information, visit AWS’ Principal page in the IAM User Guide. To know more about how to restrict Amazon S3 Bucket access to a specific IAM role, click here.
Published at DZone with permission of Jayashree Hegde Adkoli, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.
Seven Steps To Deploy Kedro Pipelines on Amazon EMR
What Is Envoy Proxy?
Event-Driven Architecture Using Serverless Technologies
Integrating AWS With Salesforce Using Terraform