【发布时间】:2019-10-06 22:59:03
【问题描述】:
我正在对 S3 存储桶执行 Amazon Athena 查询。我们称之为athena-bucket。今天,我需要通过 VPC 端点限制此存储桶。所以我尝试了这个 S3 存储桶策略:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VPCe and SourceIP",
"Effect": "Deny",
"NotPrincipal": {
"AWS": [
"arn:aws:iam::**********:user/user_admin",
"arn:aws:iam::**********:root",
]
},
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::athena-bucket",
"arn:aws:s3:::athena-bucket/abc/*"
],
"Condition": {
"StringNotEquals": {
"aws:sourceVpce": [
"vpce-XXXXxxxxe",
"vpce-xxxxxxxxxx",
"vpce-XXXXXXXXXXXXXX"
]
},
"NotIpAddress": {
"aws:SourceIp": [
"publicip/32",
"publicip2/32"
]
}
}
}
]
}
请注意,Athena 拥有访问上述存储桶的完全权限。我想使用 S3 存储桶策略来限制仅来自特定 IP 地址和 VPC 端点的访问。
但是,尽管请求是通过策略中提到的 VPC 端点路由的,但我收到了 access denied error。
【问题讨论】:
标签: amazon-web-services amazon-s3 amazon-athena