Byte Ebi's Logo

Byte Ebi 🍀

A Bit everyday A Byte every week

[AWS Cloud Fundamental Notes] S3

Introduction to S3 and its usage and operational mechanism

Ray

Scalable, available, secure, and efficient cloud object storage

  • Bucket: storage space
  • Object: stored item

Encryption can be applied to objects during upload.

Each object has a unique HTTPS link. By default, accessing objects through a browser is blocked (Access Denied).

Security


Object Versions

Type Use Case
Versioning Version control, allows updates or rollbacks
MFA Delete Deletion requires MFA verification from a mobile device
Object Lock Locks object, preventing deletion

Using versioning in S3 storage


Monitoring

  • Server access logging: Monitors bucket access.
  • Object-level logging: Monitors object access.

Access Points

When an S3 bucket is accessed by multiple services, the Bucket Policy can become complex.
To decouple different services and the bucket itself, the Access Points feature was introduced.
This allows the same bucket to have different access rules.

  • Each Access Point has its own unique URL.
  • Each access point can be configured with corresponding policies for access restrictions.
  • The name is unique under the Account + Region condition.

Recent Posts

Categories

Tags