-
Notifications
You must be signed in to change notification settings - Fork 19
/
s3.yaml
66 lines (62 loc) · 1.72 KB
/
s3.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
AWSTemplateFormatVersion: 2010-09-09
Description: "Create S3 buckets that enforce encryption at rest and transit"
Parameters:
S3BucketName:
Description: "Name of the S3 bucket to store the data."
Type: String
Resources:
S3Bucket:
Type: AWS::S3::Bucket
Properties:
BucketName: !Ref S3BucketName
PublicAccessBlockConfiguration:
BlockPublicAcls: true
BlockPublicPolicy: true
IgnorePublicAcls: true
RestrictPublicBuckets: true
BucketEncryption:
ServerSideEncryptionConfiguration:
- ServerSideEncryptionByDefault:
KMSMasterKeyID: !ImportValue ExpCustomerKey
SSEAlgorithm: aws:kms
DeletionPolicy: Retain
S3BucketPolicy:
Type: AWS::S3::BucketPolicy
Properties:
Bucket:
Ref: S3Bucket
PolicyDocument:
Statement:
- Sid: "DenyUnEncryptedObjectUploads"
Action:
- "s3:PutObject"
Effect: "Deny"
Resource:
Fn::Join:
- ""
- - "arn:aws:s3:::"
- Ref: "S3Bucket"
- "/*"
Principal: "*"
Condition:
StringNotEquals:
"s3:x-amz-server-side-encryption":
- "aws:kms"
- Sid: "EnforceSSl"
Action:
- "s3:*"
Effect: "Deny"
Resource:
Fn::Join:
- ""
- - "arn:aws:s3:::"
- Ref: "S3Bucket"
- "/*"
Principal: "*"
Condition:
Bool:
"aws:SecureTransport":
- "false"
Outputs:
S3Bucket:
Value: !Ref S3Bucket