1 Answer
- Newest
- Most votes
- Most comments
0
For anyone else who wants to achieve this. I was missing a single permission "kms:GenerateDataKey". Full policy below.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"kms:Encrypt",
"kms:GenerateDataKey",
"s3:PutObject",
"s3:ListBucket",
"s3:PutObjectAcl"
],
"Resource": [
"arn:aws:s3:::<BucketName>",
"arn:aws:s3:::<BucketName>/*",
"arn:aws:kms:<Region>:<AccountID>:key/<KeyID>"
]
},
{
"Sid": "VisualEditor1",
"Effect": "Allow",
"Action": "s3:HeadBucket",
"Resource": "*"
}
]
}
answered 5 years ago
Relevant content
- asked 14 days ago
- asked a year ago
- asked 2 years ago
- How do I restore a KMS-encrypted back up file to RDS for SQL Server from an on-premises environment?AWS OFFICIALUpdated 6 months ago
- AWS OFFICIALUpdated 8 months ago