Class: Aws::S3::Types::ServerSideEncryptionByDefault
- Inherits:
-
Struct
- Object
- Struct
- Aws::S3::Types::ServerSideEncryptionByDefault
- Includes:
- Aws::Structure
- Defined in:
- lib/aws-sdk-s3/types.rb
Overview
Describes the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn’t specify any server-side encryption, this default encryption will be applied. If you don’t specify a customer managed key at configuration, Amazon S3 automatically creates an Amazon Web Services KMS key in your Amazon Web Services account the first time that you add an object encrypted with SSE-KMS to a bucket. By default, Amazon S3 uses this KMS key for SSE-KMS. For more information, see [PUT Bucket encryption] in the *Amazon S3 API Reference*.
[1]: docs.aws.amazon.com/AmazonS3/latest/API/RESTBucketPUTencryption.html
Constant Summary collapse
- SENSITIVE =
[:kms_master_key_id]
Instance Attribute Summary collapse
-
#kms_master_key_id ⇒ String
Amazon Web Services Key Management Service (KMS) customer Amazon Web Services KMS key ID to use for the default encryption.
-
#sse_algorithm ⇒ String
Server-side encryption algorithm to use for the default encryption.
Instance Attribute Details
#kms_master_key_id ⇒ String
Amazon Web Services Key Management Service (KMS) customer Amazon Web Services KMS key ID to use for the default encryption. This parameter is allowed if and only if ‘SSEAlgorithm` is set to `aws:kms` or `aws:kms:dsse`.
You can specify the key ID, key alias, or the Amazon Resource Name (ARN) of the KMS key.
-
Key ID: ‘1234abcd-12ab-34cd-56ef-1234567890ab`
-
Key ARN: ‘arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab`
-
Key Alias: ‘alias/alias-name`
If you use a key ID, you can run into a LogDestination undeliverable error when creating a VPC flow log.
If you are using encryption with cross-account or Amazon Web Services service operations you must use a fully qualified KMS key ARN. For more information, see [Using encryption for cross-account operations].
Amazon S3 only supports symmetric encryption KMS keys. For more information, see [Asymmetric keys in Amazon Web Services KMS] in the *Amazon Web Services Key Management Service Developer Guide*.
[1]: docs.aws.amazon.com/AmazonS3/latest/dev/bucket-encryption.html#bucket-encryption-update-bucket-policy [2]: docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html
15826 15827 15828 15829 15830 15831 |
# File 'lib/aws-sdk-s3/types.rb', line 15826 class ServerSideEncryptionByDefault < Struct.new( :sse_algorithm, :kms_master_key_id) SENSITIVE = [:kms_master_key_id] include Aws::Structure end |
#sse_algorithm ⇒ String
Server-side encryption algorithm to use for the default encryption.
15826 15827 15828 15829 15830 15831 |
# File 'lib/aws-sdk-s3/types.rb', line 15826 class ServerSideEncryptionByDefault < Struct.new( :sse_algorithm, :kms_master_key_id) SENSITIVE = [:kms_master_key_id] include Aws::Structure end |