Home › Forums › AWS › AWS Certified Solutions Architect Associate › Regarding the question Category: CSAA – Design Secure Applications and Architect › Reply To: Regarding the question Category: CSAA – Design Secure Applications and Architect
-
Hello vinodache,
Thanks for your feedback.
I’m assuming you mean bucket policy. A bucket policy and IAM policy can be used to authenticate access to an S3 bucket. If there’s no bucket policy attached to a bucket, S3 will get its information about who can access and which objects can be accessed from the IAM Policy of the user calling the action. It’s actually a matter of preference. But as long as the question goes and the requirements it’s asking, the given correct answers are valid.
You may refer to this policy evaluation logic diagram:
https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html
Let me know what you think
Thanks & Regards,
Carlo @ Tutorials Dojo
- This reply was modified 3 years, 7 months ago by Carlo-TutorialsDojo.
- This reply was modified 3 years, 7 months ago by Carlo-TutorialsDojo.
- This reply was modified 3 years, 7 months ago by Carlo-TutorialsDojo.