7. Who are
you?
What IP
do you
have?
Is this right time to
access me? Which parts of me
you can access?
What can you do
here?
Can you set
lifecycle here?
Are you able to
write content?
10. Use cases
● Prevent unauthorized access to your S3 resources
● Enables you to store application configs, secrets in S3 bucket
● Enables development for 3rd parties
● Ensure only users from corp network can access your S3 resources
● S3 static websites
● Enables fine-grained permissions inside bucket - one folder for public access,
another one for internal assets
● Improve your compliance level