- Newest
- Most votes
- Most comments
Hi, as it says in the Reference Link you provided, "Because AWS managed KMS key policies can't be updated, cross-account permissions also can't be granted for those key policies. Additionally, objects that are encrypted using an AWS managed KMS key can't be accessed by other AWS accounts".
If you want cross-account access you have to use a customer-manager KMS master key.
@skinsman - Thanks for your input. I understood it. If that's the scenario then there is one part that I would like to understand.
As I mentioned that, Account A has AWS Managed Key (KMS) encryption set on S3 bucket So when I performed **the similar lambda function execution on Account A to copy objects to Account B (Server side encryption - SSE-S3) s3 bucket **then it successfully copied.
Only when I was copying objects from Account B to Account A then I was getting an error message "Access Denied".
Can you please help me understand that?
https://repost.aws/knowledge-center/s3-cross-encrypted-replication You can follow this
Relevant content
- asked 2 years ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 years ago