I think I answered myself, IAM is not relevant S3 says the user can do this to this bucket so they can.
And considering, I was in an IAM account under the Organizations root, that is also not surprising!
Once I logged out/in into an account under the correct OU, it all worked fine!
Edited by: davporte on Jan 27, 2020 10:45 PM
Edited by: davporte on Jan 28, 2020 3:58 AM
Finding the right policy in IAMasked 3 months ago
I have lots of tables that are stuck in the "Pending Records" Validation state and I can't get them to progressasked 2 months ago
Recommended IAM structure to link a machine user to a policy? Running on-prem.asked 4 months ago
rds-db:* and organizationsasked 4 months ago
IAM Policy that allows only access to "Switch Role"asked 5 months ago
can i add compliance policy to root account?asked 7 months ago
AWS: How to attach a policy to an IAM user that grants him the privilege to create a verified identity and not access root identities?asked 8 months ago
How do I use a schema fields default value in a template?asked 3 years ago
Confusion around SCP and IAM policy intersection ?asked 3 years ago
Unable to update the email address of a AWS Account under AWS Organizationsasked 8 months ago