2 Respostas
- Mais recentes
- Mais votos
- Mais comentários
0
Try the Policy Simulator on the role. In the console, find the role, click on the Simulate button and then set up the simulator for the GetObject and set the Object key. This may tell you what is blocking access or at least eliminate some policies.
0
Hello, I just came accross this issue too, I did some digging on the AWS Systems Manager > Run Command to see more details about it and it is saying wrong Platform.
Upon researching for the Document I noticed that there are multiple Documents for different Platform, so it could be that.
"AmazonInspector2-InvokeInspectorSsmPlugin" -> Windows Platform "AmazonInspector2-InvokeInspectorSsmPluginLinux" -> Linux Platform
respondido há 3 meses
Conteúdo relevante
- AWS OFICIALAtualizada há 2 anos
- AWS OFICIALAtualizada há 9 meses
- AWS OFICIALAtualizada há 6 meses
Thanks for your answer. Unfortunately I tried that and the policy is allowed on both the Bucket and the Resource.
What was interesting though was my executing the policy simulator triggered the Access Denied alarm for 'GetBucketPolicy ' using my own user but when I checked the results, I have 'Allow' permissions.