1 Answer
- Newest
- Most votes
- Most comments
1
Is the S3 bucket in the same AWS account as the IAM role? Is SSE-KMS or SSE-S3 chosen as the default encryption option for the bucket?
If SSE-KMS is used, the kms:Decrypt and kms:GenerateDataKey permissions to the corresponding KMS key ARN must be explicitly permitted for the IAM role accessing the bucket.
If the IAM role and the resources are in different accounts, then the IAM policies attached to the role and the resource-based policies of the target resources (like bucket policies for S3 and key policies or key grants for KMS) must both grant the permissions.
Relevant content
- asked 10 months ago

Thanks @Leo K. It made it work. I wonder why the auto-generated role didn't created this permissions for me :)