How To

S3 bucket policies - support for custom policies and guardrails

Turbot Guardrails now supports custom S3 bucket policies and has added new guardrails to restrict anonymous and cross-account bucket access.

Turbot Team
3 min. read - May 20, 2016
Turbot Guardrails now supports custom S3 bucket policies and has added new guardrails to restrict anonymous and cross-account bucket access.

Turbot Guardrails now supports custom S3 bucket policies and has added new guardrails to restrict anonymous and cross-account bucket access. Users with AWS/S3/Admin permissions can create, update, and delete bucket policies for all buckets in their account (except for the regional Guardrails logging buckets).

Adding Bucket Policies

Here's how you can add a custom bucket policy to a bucket in an account that has the "S3 > Encryption at Transit" option enabled.

Start by selecting the S3 bucket, expand Permissions, and click on Edit bucket policy (or Add bucket policy):

You should already see the bucket policy enforcing encryption in transit:

Add your own statements to the bucket policy and then Save your changes:

Example bucket policies are available from AWS to help users get started.

Anonymous and Cross-Account Access Guardrails

Cluster administrators can restrict anonymous and cross-account access through S3 options:

If either option is set to Repair, any prohibited access will be denied and the policies will need to be cleaned up manually.

Turbot Guardrails recommends restricting anonymous and cross-account access unless there is a specific requirement to allow them.