1 Answer
- Newest
- Most votes
- Most comments
0
Try this ststement on the key policy:
"Statement": [ { "Sid": "Allow Key utilization", "Effect": "Allow", "Principal": { "AWS": [ "arn:aws:iam::ACCOUNT_ID:root" ] }, "Action": [ "kms:Decrypt", "kms:GenerateDataKey*" ], "Resource": "*" },
That would allow all the services in the account to use encrypt/decrypt using the key, ASG might not be the service trying to publish to the topic.
Another thing that helps a lot is to check CloudTrail Event History around the time the message should have sent, including the "Error code" field
answered a year ago
Relevant content
- asked 5 years ago
- asked 2 years ago
- asked 2 months ago
- Accepted Answerasked 9 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 2 months ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated a year ago