Actions, resources, and condition keys for Amazon S3 Tables
Amazon S3 Tables (service prefix: s3tables) provides the following    service-specific resources, actions, and condition context keys for use in IAM permission    policies.
References:
- 
            Learn how to configure this service. 
- 
            View a list of the API operations available for this service. 
- 
            Learn how to secure this service and its resources by using IAM permission policies. 
Topics
Actions defined by Amazon S3 Tables
You can specify the following actions in the Action element of an IAM      policy statement. Use policies to grant permissions to perform an operation in AWS. When you      use an action in a policy, you usually allow or deny access to the API operation or CLI      command with the same name. However, in some cases, a single action controls access to more      than one operation. Alternatively, some operations require several different actions.
The Access level column of the Actions table describes how the action is classified (List, Read, Permissions management, or Tagging). This classification can help you understand the level of access that an action grants when you use it in a policy. For more information about access levels, see Access levels in policy summaries.
The Resource types column of the Actions table indicates whether each      action supports resource-level permissions. If there is no value for this column, you must      specify all resources ("*") to which the policy applies in the Resource element      of your policy statement. If the column includes a resource type, then you can specify an ARN      of that type in a statement with that action. If the action has one or more required      resources, the caller must have permission to use the action with those resources. Required      resources are indicated in the table with an asterisk (*). If you limit resource access with      the Resource element in an IAM policy, you must include an ARN or pattern for      each required resource type. Some actions support multiple resource types. If the resource      type is optional (not indicated as required), then you can choose to use one of the optional      resource types.
The Condition keys column of the Actions table includes keys that you      can specify in a policy statement's Condition element. For more information on      the condition keys that are associated with resources for the service, see the        Condition keys column of the Resource types table.
The Dependent actions column of the Actions table shows additional permissions that may be required to successfully call an action. These permissions may be needed in addition to the permission for the action itself. When an action specifies dependent actions, those dependencies may apply to additional resources defined for that action, not only the first resource listed in the table.
Note
Resource condition keys are listed in the Resource types table. You can find a link to the resource type that applies to an action in the Resource types (*required) column of the Actions table. The resource type in the Resource types table includes the Condition keys column, which are the resource condition keys that apply to an action in the Actions table.
For details about the columns in the following table, see Actions table.
| Actions | Description | Access level | Resource types (*required) | Condition keys | Dependent actions | 
|---|---|---|---|---|---|
| CreateNamespace | Grants permission to create a namespace | Write | |||
| CreateTable | Grants permission to create a table | Write | |||
| CreateTableBucket | Grants permission to create a table bucket | Write | |||
| DeleteNamespace | Grants permission to delete a namespace | Write | |||
| DeleteTable | Grants permission to delete a table | Write | |||
| DeleteTableBucket | Grants permission to delete a table bucket | Write | |||
| DeleteTableBucketEncryption | Grants permission to delete encryption configuration on a table bucket | Write | |||
| DeleteTableBucketPolicy | Grants permission to delete a policy on a table bucket | Permissions management | |||
| DeleteTablePolicy | Grants permission to delete a policy on a table | Permissions management | |||
| GetNamespace | Grants permission to get a namespace | Read | |||
| GetTable | Grants permission to retrieve a table | Read | |||
| GetTableBucket | Grants permission to retrieve a table bucket | Read | |||
| GetTableBucketEncryption | Grants permission to retrieve encryption configuration on a table bucket | Read | |||
| GetTableBucketMaintenanceConfiguration | Grants permission to retrieve a maintenance configuration on a table bucket | Read | |||
| GetTableBucketPolicy | Grants permission to retrieve a policy on a table bucket | Read | |||
| GetTableData [permission only] | Grants permission to read metadata and data objects from a table storage endpoint using S3 APIs | Read | |||
| GetTableEncryption | Grants permission to retrieve encryption configuration on a table | Read | |||
| GetTableMaintenanceConfiguration | Grants permission to retrieve a maintenance configuration on a table | Read | |||
| GetTableMaintenanceJobStatus | Grants permission to retrieve the status of maintenance jobs on a table | Read | |||
| GetTableMetadataLocation | Grants permission to retrieve the metadata location of a table | Read | |||
| GetTablePolicy | Grants permission to retrieve a policy on a table | Read | |||
| ListNamespaces | Grants permission to list namespaces | List | |||
| ListTableBuckets | Grants permission to list table buckets | List | |||
| ListTables | Grants permission to list tables | List | |||
| PutTableBucketEncryption | Grants permission to put or overwrite encryption configuration on a table bucket | Write | |||
| PutTableBucketMaintenanceConfiguration | Grants permission to put a maintenance configuration on a table bucket | Write | |||
| PutTableBucketPolicy | Grants permission to create or overwrite a policy on a table bucket | Permissions management | |||
| PutTableData [permission only] | Grants permission to write metadata and data objects to a table storage endpoint using S3 APIs | Write | |||
| PutTableEncryption [permission only] | Grants permission to put encryption configuration on a table | Write | |||
| PutTableMaintenanceConfiguration | Grants permission to put a maintenance configuration on a table | Write | |||
| PutTablePolicy | Grants permission to create or overwrite a policy on a table | Permissions management | |||
| RenameTable | Grants permission to rename a table or move a table across namespaces | Write | |||
| UpdateTableMetadataLocation | Grants permission to update the metadata location of a table | Write | |||
Resource types defined by Amazon S3 Tables
The following resource types are defined by this service and can be used in the        Resource element of IAM permission policy statements. Each action in the        Actions table identifies the      resource types that can be specified with that action. A resource type can also define which      condition keys you can include in a policy. These keys are displayed in the last column of the      Resource types table. For details about the columns in the following table, see Resource types table.
| Resource types | ARN | Condition keys | 
|---|---|---|
| TableBucket | arn:${Partition}:s3tables:${Region}:${Account}:bucket/${TableBucketName} | |
| Table | arn:${Partition}:s3tables:${Region}:${Account}:bucket/${TableBucketName}/table/${TableID} | 
Condition keys for Amazon S3 Tables
Amazon S3 Tables defines the following condition keys that can be used in the        Condition element of an IAM policy. You can use these keys to further refine      the conditions under which the policy statement applies. For details about the columns in the      following table, see Condition keys table.
To view the global condition keys that are available to all services, see AWS global condition context keys.
| Condition keys | Description | Type | 
|---|---|---|
| s3tables:KMSKeyArn | Filters access by the AWS KMS key ARN for the key used to encrypt a table | ARN | 
| s3tables:SSEAlgorithm | Filters access by the server-side encryption algorithm used to encrypt a table | String | 
| s3tables:namespace | Filters access by the namespaces created in the table bucket | String | 
| s3tables:tableName | Filters access by the name of the tables in the table bucket | String |