The request came from the security team: lock down AWS S3 access in a hybrid cloud setup, but keep it fast. The answer was clear—read-only roles.
Hybrid cloud access to AWS S3 needs precision. The goal is simple: allow data visibility without risking modification or deletion. This is common in workflows where on-prem systems integrate with cloud-based storage. The challenge is balancing permissions, network paths, and identity federation across environments.
Start with IAM. Create a role with GetObject and ListBucket but omit any PutObject or DeleteObject actions. Attach this policy to the role that your hybrid cloud service will assume. In multi-region deployments, replicate the policy to all relevant buckets to avoid inconsistent behavior.
When dealing with hybrid setups—especially those involving Kubernetes clusters or private data centers—federation often uses AWS STS. Configure your identity provider to map users or service accounts to the S3 read-only role via trust relationships. This ensures that only authenticated entities from your hybrid environment can access the role.