This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
接受
或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
发布评论
评论(2)
是的,用户可以授予对任何和所有 S3 存储桶的访问权限。
是的,用户可以创建新的 IAM 用户来访问任何和所有存储桶(以及 AWS 账户中的任何其他内容)。
对于可以授予哪些 IAM 访问权限,您可能非常具体(例如,只能将用户放入特定的 IAM 组),但这可能会消除您希望在第一名。
该帐户要么需要是“任何人都可以做任何事情”(结果是其他人可能会修改/销毁您创建的资源),或者您需要为每个开发人员提供自己的 AWS 帐户以将其视为一个没有其他人可以影响它的“沙箱”。
一个中间选项可能是允许用户部署 AWS CloudFormation 堆栈,该堆栈可以创建基础设施,但(通常)不允许现有基础设施受到影响。
Yes, the user can grant access to any and all S3 buckets.
Yes, the user can create new IAM Users that can access any and all buckets (and anything else in the AWS Account).
You could be very specific about which IAM access can be granted (eg can only put users in specific IAM Groups) but that would probably take away the reason why you wanted to have IAM access in the first place.
Either the account needs to be "anyone can do anything" (with the result that somebody else might modify/destroy the resources you created), or you need to give each developer their own AWS Account to treat as a 'sandbox' where nobody else can impact it.
An in-between option might be to allow users to deploy AWS CloudFormation stacks that can create infrastructure but (generally) does not allow existing infrastructure to be impacted.
开桶>权限>存储桶策略
然后添加策略 类似于以下内容:
此策略拒绝用户访问存储桶,即使用户具有管理员权限也是如此。
Open Bucket > Permissions > Bucket Policy
Then Add Policy Similar to below:
This Policy Denies Access to the bucket for the user, even if the user has Admin Permissions.