2 Answers
- Newest
- Most votes
- Most comments
0
Issue got resolved... The inline policy on the permission set, was restricting bucket by specific bucket on resource tag, and somehow this was not working. A specific bucket restriction should be added in condition by the new AWS condition tags.
answered a year ago
Relevant content
- asked 2 years ago
- Accepted Answerasked a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated 7 months ago
S3 bucket has basic access for AWSBillingConductor write, so that Billing can dump its monthly reports. Was advised to allow this access through IAM. On another note, had tried modifying s3 policy for that specific sso role arn, but that had not shown the bucket either. Can we add a permission set to s3 bucket policy, instead(permission sets are new to me).