githubEdit

Authentication and access control

circle-info

This page was generated from content adapted from the AWS Developer Guidearrow-up-right

IAM policies

VPC endpoint

Condition keys

Cross-account access

  • Note The examples in this topic show how to use a key policy and IAM policy together to provide and limit access to a KMS key. These generic examples are not intended to represent the permissions that any particular AWS service requires on a KMS key. For information about the permissions that an AWS service requires, see the encryption topic in the service documentation.

  • Note The key policy for the KMS key must give the external account (or users and roles in the external account) permission to use the KMS key.

  • Note Do not set the Principal to an asterisk (*) in any key policy statement that allows permissions unless you use conditions to limit the key policy. An asterisk gives every identity in every AWS account permission to use the KMS key, unless another policy statement explicitly denies it. Users in other AWS accounts just need corresponding IAM permissions in their own accounts to use the KMS key.

Permissions reference

  • Note You might have to scroll horizontally or vertically to see all of the data in the table.

Last updated