Increasing Your Security Posture when Using Amazon S3

This course has been designed to introduce you to the different security controls and methods that have been built into Amazon S3 to protect your data and enhance your overall security posture. You will learn about resource ownership, access control policies, S3 Access Points, Access Analyzer, and how to use Cross Origin Resource Sharing (CORS).

If you have any feedback relating to this course, please contact us at

Learning Objectives

  • Understand resource ownership in Amazon S3
  • Use policies to control access
  • Scale access to shared buckets with S3 Access Points
  • Use Access Analyzer to monitor access to buckets
  • Learn what Cross Origin Resource Sharing (CORS) is and how to use it

Intended Audience

This course is intended for anyone who is responsible for securing, designing, and managing Amazon S3, or who simply wants to learn more about security in Amazon S3.


To get the most out of this course, you should have a basic understanding of Amazon S3. It's also recommended that you have a solid understanding of AWS IAM policy syntax and structure.


Hello, and welcome to this course that has been designed to introduce you to the different security controls and methods that have been built into Amazon S3 to protect your data and therefore enhancing your overall security posture.

Before we start, I'd like to introduce myself. My name is Stuart Scott, and I'm the AWS Content and Security Lead here at Cloud Academy. Feel free to connect with me to ask me any questions using the details shown on the screen. Alternatively, you can always get in touch with us here at Cloud Academy by sending an email to, where one of our cloud experts will reply to your question.

This course has been set at an intermediate to advanced level, and it's been designed to assist those who are responsible for securing, designing, and managing Amazon S3. There are many different methods of securing your object data, and so if you are involved in this process, then this course will be beneficial for you.

The objectives of this course are to examine the different security controls of Amazon S3, including resource ownership, identity-based policies, resource-based policies, including Bucket policies and access control lists, how to scale access to shared buckets using S3 access points, how to manage public access to your buckets, S3 Alerting with Access Analyzer, and cross-origin resource sharing with S3. Encryption of your data will not be covered in this course, as this is covered in greater depth in our existing course, found here.

As a prerequisite to this course, it would be beneficial to have a basic awareness of Amazon S3. It's also recommended that you have a solid understanding of AWS IAM policy syntax and structure. For more information on these services, please see our existing courses here:

Feedback on our courses here at Cloud Academy is valuable to both us as trainers and any students looking to take the same course in the future. If you have any feedback, positive or negative, it'd be greatly appreciated if you can contact

Please note at the time of writing this content, all course information was accurate. AWS implements hundreds of updates every month as a part of their ongoing drive to innovate and enhance their services. As a result, minor discrepancies may appear in the course content over time. But here at Cloud Academy, we strive to keep our content up-to-date, in order to provide the best training available. So if you notice any information that is outdated, please do contact, and this will allow us to update the course content during its next release cycle. Thank you.

About the Author
Learning Paths

Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.

To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.

Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.

He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.

In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.

Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.