Open mjubb opened 1 year ago
Hello,
Thank you for posting the question!
Amazon S3 buckets that you mentioned are normally accessed using unauthenticated calls as these contain public data sets managed by AWS Services. Since requests to these buckets pass through your network, Amazon S3 VPC endpoint configured in your VPC need to allow the access (please see this Readme for more details). However, since SCPs apply only to your identities (e.g. IAM Roles), you don’t need to exclude this access pattern from your ResourceOrgId restriction in SCPs.
EnforceResourcePerimeterAWSResourcesS3 statement can be used to ensure that access is not denied to Amazon S3 resources owned by AWS services when those services use FAS to access them on your behalf. This access pattern applies when you access data via an AWS service and that service takes subsequent actions on your behalf by using your AWS Identity and Access Management (IAM) credentials. Two examples provided in the repo are AWS Data Exchange publishing and subscribing and AWS Service Catalog operations (please see this Readme for more details).
Please let us know if you have any additional questions.
Thanks so much for the response, makes perfect sense that the AWS managed buckets are usually unauthenticated calls. That's helped my understanding a lot.
We've run into trouble with the arn:aws:s3:::ec2imagebuilder-managed-resources-
Thanks again for your support, it's really appreciated!
Edit: I just realized it was your re:Inforce 2022 talk that was my intro to Data Perimeter - so double thanks!
Hello,
Could you please confirm that the 403 error you are receiving is indeed for arn:aws:s3:::ec2imagebuilder-managed-resources--prod/components/*?
There are other reasons for why your operation might be failing:
We will update the repo with the above recommendation once our internal review process is complete.
Hi,
Apologies that this is more question than issue. In the VPC endpoint policies I can see that the policies allow AWS managed S3 buckets for operations (like patching/ssm/image builder) are explicitly allowed for GetObject actions. However, the SCP item EnforceResourcePerimeterAWSResourcesS3 looks like it does not allow AWS managed S3 buckets to be accessed without the resource-perimeter-exception tag being in place? Is this the case?
Or am I misunderstanding the EnforceResourcePerimeterAWSResourcesS3 SCP and it does allow access to AWS managed S3 buckets?