Chapter 6. Securing Resources with Bucket Policies and IAM
This chapter is divided into two parts; the first part is an introduction to the access control method and the difference between resource-based policies and user policies, and the last part includes bucket policy examples and their structures based on common use cases with the following walkthroughs:
- Walkthrough 1: To grant users bucket permissions
- Walkthrough 2: To grant cross-account bucket permissions
- Walkthrough 3: To grant cross-account bucket permissions to objects without ownership
- Walkthrough 4: Bucket and user policy examples