All posts

The bucket is locked, but you still need to read it.

AWS S3 read-only roles let you grant access without risk of accidental writes or deletes. Pair this with FIPS 140-3 encryption compliance and you have a storage design that passes security audits while staying fast and simple. What is FIPS 140-3 in AWS S3? FIPS 140-3 is the U.S. standard for cryptographic modules. In AWS, services like S3 can use FIPS endpoints that enforce approved encryption algorithms for data in transit. This ensures that any request to S3 meets strict security requirements

Free White Paper

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

AWS S3 read-only roles let you grant access without risk of accidental writes or deletes. Pair this with FIPS 140-3 encryption compliance and you have a storage design that passes security audits while staying fast and simple.

What is FIPS 140-3 in AWS S3?
FIPS 140-3 is the U.S. standard for cryptographic modules. In AWS, services like S3 can use FIPS endpoints that enforce approved encryption algorithms for data in transit. This ensures that any request to S3 meets strict security requirements—critical for regulated workloads. Using AWS SDKs, you can connect to these endpoints instead of the public S3 API to achieve compliance.

Why link FIPS 140-3 with read-only IAM roles?
Compliance alone is not enough. You must also control what each AWS identity can do. Read-only S3 IAM roles give you fine-grained permissions that allow listing and retrieving objects, but not writing or deleting them. By combining a read-only IAM policy with FIPS 140-3 endpoints, you enforce both data access boundaries and cryptographic integrity. This reduces attack surface while meeting regulatory standards.

Continue reading? Get the full guide.

End-to-End Encryption + Sarbanes-Oxley (SOX) IT Controls: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

How to implement a FIPS 140-3 AWS S3 read-only role:

  1. Create an IAM policy with s3:GetObject and s3:ListBucket actions.
  2. Attach the policy to a new IAM role.
  3. Configure your application or CLI to use the role’s credentials.
  4. Set the S3 endpoint to the appropriate FIPS URL (for example: https://s3-fips.us-east-1.amazonaws.com).
  5. Test access by listing objects and retrieving files; ensure writes fail as expected.

AWS supports these endpoints in most regions. Always verify your region’s FIPS compatibility. Combine this with CloudTrail logging to audit access in real time.

The result: read-only FIPS 140-3 S3 roles that secure your data paths, align with compliance mandates, and minimize operational risk.

See how this setup runs without friction. Build and deploy a FIPS 140-3 AWS S3 read-only role in minutes at hoop.dev—watch it work live.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts