#1 When the bucket is created, encryption will be enabled. If an existing KMS key is not provided, it will be created.
The text was updated successfully, but these errors were encountered:
This goes along with this requirement
It may be better not even to permit the passing of a key and just create with the bucket.
Format would be k-kms-{bucket_name}
k-kms-{bucket_name}
Sorry, something went wrong.
Encryption enforced with Bucket Policy:
{ "Version": "2012-10-17", "Id": "PutObjPolicy", "Statement": [ { "Sid": "DenyIncorrectEncryptionHeader", "Effect": "Deny", "Principal": "*", "Action": "s3:PutObject", "Resource": "arn:aws:s3:::<bucket_name>/*", "Condition": { "StringNotEquals": { "s3:x-amz-server-side-encryption": "AES256" } } }, { "Sid": "DenyUnEncryptedObjectUploads", "Effect": "Deny", "Principal": "*", "Action": "s3:PutObject", "Resource": "arn:aws:s3:::<bucket_name>/*", "Condition": { "Null": { "s3:x-amz-server-side-encryption": true } } } }
Closed in 5e51436
No branches or pull requests
#1 When the bucket is created, encryption will be enabled. If an existing KMS key is not provided, it will be created.
The text was updated successfully, but these errors were encountered: