This topic explains how you can securely grant Index Exchange (Index) read/write access to an Amazon S3 bucket using cross-account Identity and Access Management (IAM) roles.
Workflow
To grant access to Index, you must follow this workflow:
Note: Contact your Index Representative to request the Index IAM Role ARN (Amazon Resource Name) that will assume your AWS IAM role. You'll need this Role ARN when configuring the trust relationship.
Create an IAM role in your AWS account
Create an IAM role that will be assumed by Index to access your S3 bucket:
Sign in to the AWS Management Console.
Go to IAM > Roles.
Click Create role.
Choose Custom trust policy.
Name the role.
For example:
indexexchange-s3-role.
Grant S3 bucket permissions
Note: For both read and write permissions, it is optional but recommended that you restrict the s3:GetObject resource accordingly. For example: arn:aws:s3:::bucket-name/path/*.
Read permission
Attach a permissions policy to the role that grants read access to your S3 bucket, replacing <PARTNER_BUCKET_NAME> with your S3 bucket name:
In the role, go to Permissions.
Click Add permissions > Create inline policy.
Choose JSON and paste the following policy:
{
"Version": "2012-10-17",
"Statement": [
{
Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::<PARTNER_BUCKET_NAME>"
},
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<PARTNER_BUCKET_NAME>/*"
}
]
}
Write permission
Attach a permissions policy to the role that grants write access to your S3 bucket, replacing <PARTNER_BUCKET_NAME> with your S3 bucket name:
In the role, go to Permissions.
Click Add permissions > Create inline policy.
Choose JSON and paste the following policy:
{
"Version": "2012-10-17",
"Statement": [
{
Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::<PARTNER_BUCKET_NAME>"
},
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::<PARTNER_BUCKET_NAME>/*"
}
]
}Configure the trust relationship
The trust relationship defines who is allowed to assume the role. Update the role’s trust relationship with the following JSON, replacing <INDEX_INTERNAL_ROLE_ARN> with the Role ARN provided by Index:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": "<INDEX_INTERNAL_ROLE_ARN>"
},
"Action": "sts:AssumeRole"
}
]
} Notes:
<INDEX_INTERNAL_ROLE_ARN>must be the exact Role ARN provided by Index.An
ExternalIdcondition may be added if required by your security team or requested by Index.
Share the Role ARN with Index
After the role and policies are created, copy the Role ARN from the IAM console and share it securely with Index, along with your bucket's name, URL, and region. Index will configure their internal systems to assume this role.
After you finish: Index will validate access by assuming the role and attempting to read from the bucket. No further action is required unless permissions need to be adjusted.