Reputation: 21
I have a VPC, with a VPC endpoint that is associated with a particular route table, say RTB1. Subnet1 uses RTB1 while Subnet2 doesn't.
If I attach a policy to the S3 bucket, specifying the vpc-ID as in the policy below:
{
"Version": "2012-10-17",
"Id": "Policy1415115909152",
"Statement": [
{
"Sid": "Access-to-specific-VPC-only",
"Principal": "*",
"Action": "s3:*",
"Effect": "Deny",
"Resource": ["arn:aws:s3:::my_secure_bucket",
"arn:aws:s3:::my_secure_bucket/*"],
"Condition": {
"StringNotEquals": {
"aws:sourceVpc": "vpc-111bbb22"
}
}
}
]
}
Will this allow instances in Subnet2 to access the S3 bucket? Even though those instances are not routed through RBT1, which has the vpc-endpoint entry?
Upvotes: 1
Views: 152
Reputation: 21
Here is a summary of the behavior:
Scenario: Assume there is - 1 VPC, vpc-111bbb22 - 3 subnets *subnet-1111 behind s3 vpc endpoint vpce-1111, *subnet-2222 behind s3 vpce-2222 and *subnet-3333 which is not associated with any vpc endpoint. - 1 S3 bucket named my_secure_bucket (NOTE: this bucket has to be in the same region as the VPC/VPC endpoints) Using the above bucket policy, the accessibility is as follows: subnet-1111 - can access subnet-2222 - can access subnet-3333 - cannot access
Upvotes: 1