Skip to content

Commit

Permalink
Docs for prefix permissions (#3278)
Browse files Browse the repository at this point in the history
  • Loading branch information
sir-sigurd authored Jan 24, 2023
1 parent 601daf7 commit e66b80f
Show file tree
Hide file tree
Showing 2 changed files with 39 additions and 0 deletions.
1 change: 1 addition & 0 deletions docs/SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@
* [S3 Bucket Organization](advanced-features/s3-bucket-organization.md)
* [GxP & Quilt](advanced-features/good-practice.md)
* [Private Endpoint Access](advanced-features/private-endpoint-access.md)
* [Restricting access to specific prefixes in a S3 bucket](advanced-features/s3-prefix-permissions.md)

### More
* [Frequently Asked Questions](FAQ.md)
Expand Down
38 changes: 38 additions & 0 deletions docs/advanced-features/s3-prefix-permissions.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
# Restricting access to specific prefixes in a S3 bucket

> Users will still have access to the full list of S3 objects,
packages and logical keys inside of packages.

You can isolate user access to objects stored in specific S3 directories by
defining an array of accessible prefixes in a custom IAM role or Amazon S3
bucket policy.

Create "custom" role or policy with these permissions:

```json
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:GetObjectTagging",
"s3:GetObjectVersion",
"s3:GetObjectVersionTagging",
"s3:ListBucket",
"s3:ListBucketVersions",
"s3:DeleteObject",
"s3:DeleteObjectVersion",
"s3:PutObject",
"s3:PutObjectTagging"
],
"Resource": [
"arn:aws:s3:::<BUCKET>",
"arn:aws:s3:::<BUCKET>/.quilt/*",
"arn:aws:s3:::<BUCKET>/<PREFIX>/*"
]
}
]
}
```

0 comments on commit e66b80f

Please sign in to comment.