Manual (Console-based) Storage Access
Use these steps to manually grant or revoke Xshield access to specific Amazon S3 buckets by updating the IAM permissions on the AWS cross-account role used by the AWS Cloud Connector. Before you begin, complete the AWS manual onboarding and confirm the cross-account role (for example, ColorTokensCrossAccountAccessRole) exists in your AWS account.
Grant Storage Access
Use these steps when you want to restrict Xshield storage access to one (or a small set of) S3 buckets by explicitly setting the bucket ARN(s) in the IAM policy.
-
Open the AWS Console and go to IAM → Roles.
-
Open the cross-account role you created for Xshield (for example,
ColorTokensCrossAccountAccessRole). -
Go to the Permissions tab.
-
Edit the inline policy that contains the S3 permissions (in the manual onboarding guide this is the statement that includes
s3:ListBucket).- If you used an inline policy: click the policy name → Edit.
- If you used a managed policy: open the policy → Edit policy.
-
In the S3 statement, replace the wildcard resource (
"Resource": "*") with the ARN of your bucket and the ARN of objects in that bucket.-
Bucket ARN format:
arn:aws:s3:::YOUR_BUCKET_NAME -
Object ARN format:
arn:aws:s3:::YOUR_BUCKET_NAME/*
-
-
Update the S3 statement to use bucket-scoped resources. Example (replace
YOUR_BUCKET_NAME):{
"Sid": "ColorTokensS3FullReadAccess",
"Effect": "Allow",
"Action": [
"s3:ListAllMyBuckets",
"s3:GetBucketLocation",
"s3:GetBucketAcl",
"s3:GetBucketPolicy",
"s3:GetBucketVersioning",
"s3:GetBucketPublicAccessBlock",
"s3:GetBucketNotification",
"s3:GetBucketTagging",
"s3:ListBucket",
"s3:GetObject"
],
"Resource": [
"arn:aws:s3:::YOUR_BUCKET_NAME",
"arn:aws:s3:::YOUR_BUCKET_NAME/*"
]
} -
If you want to allow access to multiple buckets, add additional bucket and object ARNs to the
Resourcearray (one pair per bucket). -
Save the policy.
-
Validate the change:
- In the Xshield portal, re-run Verify / Connect for the AWS Cloud Connector (if available).
- In AWS, you can optionally use IAM Policy Simulator for the role to confirm
s3:ListBucketands3:GetObjectare allowed only for the bucket(s) you listed.
Revoke Storage Access
Use these steps to remove previously granted bucket-scoped S3 access.
-
Open the AWS Console and go to IAM → Roles.
-
Open the Xshield cross-account role (for example,
ColorTokensCrossAccountAccessRole). -
Go to the Permissions tab and open the policy that contains the S3 permissions.
-
Remove the bucket ARN(s) from the S3 statement
Resourcelist.- To revoke access for a single bucket, remove both:
arn:aws:s3:::YOUR_BUCKET_NAMEarn:aws:s3:::YOUR_BUCKET_NAME/*
- To revoke all S3 storage access, remove the entire S3 statement (the one that includes
s3:ListBucket/s3:GetObject) or remove all bucket/object ARNs from itsResourcelist.
- To revoke access for a single bucket, remove both:
-
Save the policy.
-
Validate the change:
- Optionally use IAM Policy Simulator to confirm
s3:ListBucket/s3:GetObjectare denied for the revoked bucket(s). - In the Xshield portal, re-run Verify / Connect (if available) and confirm expected behavior.
- Optionally use IAM Policy Simulator to confirm