🪣

AWS S3 Management

Verified

by Community

Creates comprehensive S3 bucket configurations including access policies, lifecycle rules, replication, encryption, versioning, event notifications, and cost optimization strategies for various storage use cases.

awss3storageclouddata

AWS S3 Management

Creates comprehensive Amazon S3 configurations for file storage, static website hosting, data lakes, backup archival, and content distribution. Covers bucket policies, lifecycle rules, cross-region replication, server-side encryption, versioning, access logging, event notifications, and storage class optimization for cost management.

Usage

Describe your storage use case: what type of data, access patterns (frequent, infrequent, archival), retention requirements, and security needs. Specify whether you need public access (static hosting) or private access, and any compliance requirements for encryption or data residency. The skill generates complete S3 configurations including bucket policies, lifecycle rules, and related service integrations.

Examples

  • "Configure an S3 bucket for a static website with CloudFront CDN, custom error pages, and CORS headers"
  • "Create lifecycle rules that transition objects to IA after 30 days, Glacier after 90, and delete after 365"
  • "Set up cross-region replication for a compliance bucket with versioning and MFA delete enabled"
  • "Configure an S3 event notification that triggers a Lambda function when new CSV files are uploaded"

Guidelines

  • Enable S3 Block Public Access at the account level, only disable per-bucket when explicitly needed
  • Use SSE-S3 (AES-256) as minimum encryption; use SSE-KMS with customer-managed keys for sensitive data
  • Enable versioning for any bucket containing data that cannot be easily regenerated
  • Configure lifecycle rules to move infrequently accessed data to cheaper storage classes automatically
  • Use S3 Intelligent-Tiering for unpredictable access patterns to optimize costs automatically
  • Set up access logging to a separate dedicated logging bucket for audit trails
  • Use presigned URLs for temporary access instead of making buckets or objects public
  • Apply bucket policies that enforce encryption in transit (aws:SecureTransport) and at rest