interface ServerSideEncryptionRuleProperty
| Language | Type name |
|---|---|
.NET | Amazon.CDK.AWS.S3.CfnBucket.ServerSideEncryptionRuleProperty |
Go | github.com/aws/aws-cdk-go/awscdk/v2/awss3#CfnBucket_ServerSideEncryptionRuleProperty |
Java | software.amazon.awscdk.services.s3.CfnBucket.ServerSideEncryptionRuleProperty |
Python | aws_cdk.aws_s3.CfnBucket.ServerSideEncryptionRuleProperty |
TypeScript | aws-cdk-lib » aws_s3 » CfnBucket » ServerSideEncryptionRuleProperty |
Specifies the default server-side encryption configuration.
- General purpose buckets - If you're specifying a customer managed KMS key, we recommend using a fully qualified KMS key ARN. If you use a KMS key alias instead, then AWS resolves the key within the requester’s account. This behavior can result in data that's encrypted with a KMS key that belongs to the requester, and not the bucket owner.
- Directory buckets - When you specify an AWS customer managed key for encryption in your directory bucket, only use the key ID or key ARN. The key alias format of the KMS key isn't supported.
Example
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import { aws_s3 as s3 } from 'aws-cdk-lib';
const serverSideEncryptionRuleProperty: s3.CfnBucket.ServerSideEncryptionRuleProperty = {
blockedEncryptionTypes: {
encryptionType: ['encryptionType'],
},
bucketKeyEnabled: false,
serverSideEncryptionByDefault: {
sseAlgorithm: 'sseAlgorithm',
// the properties below are optional
kmsMasterKeyId: 'kmsMasterKeyId',
},
};
Properties
| Name | Type | Description |
|---|---|---|
| blocked | IResolvable | Blocked | A bucket-level setting for Amazon S3 general purpose buckets used to prevent the upload of new objects encrypted with the specified server-side encryption type. |
| bucket | boolean | IResolvable | Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket. |
| server | IResolvable | Server | Specifies the default server-side encryption to apply to new objects in the bucket. |
blockedEncryptionTypes?
Type:
IResolvable | Blocked
(optional)
A bucket-level setting for Amazon S3 general purpose buckets used to prevent the upload of new objects encrypted with the specified server-side encryption type.
For example, blocking an encryption type will block PutObject , CopyObject , PostObject , multipart upload, and replication requests to the bucket for objects with the specified encryption type. However, you can continue to read and list any pre-existing objects already encrypted with the specified encryption type. For more information, see Blocking or unblocking SSE-C for a general purpose bucket .
Currently, this parameter only supports blocking or unblocking server-side encryption with customer-provided keys (SSE-C). For more information about SSE-C, see Using server-side encryption with customer-provided keys (SSE-C) .
bucketKeyEnabled?
Type:
boolean | IResolvable
(optional)
Specifies whether Amazon S3 should use an S3 Bucket Key with server-side encryption using KMS (SSE-KMS) for new objects in the bucket.
Existing objects are not affected. Setting the BucketKeyEnabled element to true causes Amazon S3 to use an S3 Bucket Key. By default, S3 Bucket Key is not enabled.
For more information, see Amazon S3 Bucket Keys in the Amazon S3 User Guide .
serverSideEncryptionByDefault?
Type:
IResolvable | Server
(optional)
Specifies the default server-side encryption to apply to new objects in the bucket.
If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied.

.NET
Go
Java
Python
TypeScript