I've set up an IAM user with programmatic access and created an S3 bucket in the ap-south-1 region. I allowed public access to the bucket by updating its policy and turning off the "Block all public access" setting. The IAM user has full S3 access, and I shared the access key and secret key with them. They've set everything up correctly in Veeam using the ap-south-1 region, but when trying to create a backup job, they're getting an "insufficient AWS permissions" error. What additional permissions might they need?
3 Answers
It sounds like you might need more than just s3:* for the IAM user. You should also ensure that the trust policy is configured correctly. And remember, you don’t need public access for your bucket at all—keeping that off enhances security!
Just to add to what others are saying, the Block Public Access can be set at both the account and bucket levels, so make sure that's enabled for safety. Also, reconsider if Veeam needs an IAM user or an IAM role, and check their documentation for the specific actions you're required to permit. Also, ask who "they" is—whether it’s someone using Veeam or a service on an EC2 instance, as this might impact what permissions are needed.
First off, I’d suggest turning back on the block public access settings and removing any policies that allow public access. You really don’t want your backups exposed to everyone. For Veeam, specific permissions are essential, which are detailed in their documentation, so check that out to see what's missing.
Related Questions
Sports Team Randomizer
10 Uses For An Old Smartphone
Midjourney Launches An Exciting New Feature for Their Image AI
ShortlyAI Review
Is Copytrack A Scam?
Getting 100 on Pagespeed Insights for Mobile is Impossible