Restrict a user to access a single bucket using policies on Cloud Object Storage powered by Wasabi
Description
If you want to restrict a user from accessing sensitive data on buckets in your tenant, the access to those buckets can be blocked by creating and assigning a policy.
Procedure
1. Login to the Wasabi console using your credentials (using the root account or a sub-user with Administrator Access)
2. Go to the Policies section and click on CREATE POLICY.
3. Enter a policy name and a policy description
In this example, the policy name is “backup-export-access”
4. Copy the JSON code below and paste it in the Policy Editor section. Customize the code according to your needs.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:ListAllMyBuckets",
"Resource": "arn:aws:s3:::*"
},
{
"Effect": "Allow",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::backup-export",
"arn:aws:s3:::backup-export/*"
]
}
]
}
Then, click on CREATE POLICY.
5. Assign the policy to desired users or groups. Please refer to the article on how to create groups and assign policies if needed.
6. Now that the policy is assigned, the access should be working as expected when trying to access a bucket from the web console that was not mentioned in the policy.
Note: if an access key is assigned to a user, the policy will also apply using the S3 protocol.
Example below with WinSCP: