Policy: AWS > Turbot > Logging > Bucket > Encryption in Transit
Configure Encryption in Transit on the AWS S3 Bucket.
This stack configures an AWS S3 Bucket for use as a destination for logs from other AWS services. If Encryption in Transit is set to Enabled
, the below statement will be applied to the S3 Bucket. { Sid: "MustBeEncryptedInTransit", Effect: "Deny", Principal: "*", Action: "s3:*", Resource: ['arn:${partition}:s3:::${bucketName}', 'arn:${partition}:s3:::${bucketName}/*'], Condition: { Bool: { "aws:SecureTransport": "false" } } }
Targets
This policy targets the following resource types:
Primary Policy
This policy is used with the following primary policy:
Policy Packs
This policy setting is used by the following policy packs:
Policy Specification
Schema Type |
|
---|---|
Default |
|
Valid Values [YAML] |
|
Examples [YAML] |
|
Category
In Your Workspace
Developers
- tmod:@turbot/turbot#/control/categories/resourceLogging
- tmod:@turbot/aws#/policy/types/loggingBucketEncryptionInTransit
- turbot graphql policy-type --id "tmod:@turbot/aws#/policy/types/loggingBucketEncryptionInTransit"
- turbot graphql policy-settings --filter "policyTypeId:tmod:@turbot/aws#/policy/types/loggingBucketEncryptionInTransit"
Get Policy TypeGet Policy Settings
Category URI
Policy Type URI
GraphQL
CLI