DEV Community

Cover image for Cross-account S3 replication: encrypted and non-encrypted objects
Mariem
Mariem

Posted on

Cross-account S3 replication: encrypted and non-encrypted objects

If you need to share S3 data between accounts, to meet compliant storage needs, or to bring S3 data closer to your end user, S3 Replication is a feature of the service S3 that could be your solution. S3 replication is for automatic, asynchronous copying of objects across buckets in the same or different AWS Regions, in the same or different AWS accounts. It retains all metadata, such as the original object creation time, object access control lists (ACLs), and version IDs.

For replication, both source and destination buckets must have versioning enabled, a replication rule established, and IAM permissions granted.

When setting up the replication of objects from a source bucket to a destination bucket using Amazon S3, there are several options to consider. You can :

  • Choose to replicate all the objects of the source buckets or only objects starting with a prefix or with a special tag

  • Set up a priority in the case of many replication rules for the same bucket

  • You must specify an IAM role that Amazon S3 assumes to replicate objects from the source bucket to the destination bucket.

  • Choose to replicate objects that are encrypted by server-side encryption.

  • Specify the storage class for the object replicas that can be different from the source bucket

  • Enable or disable the replication. The replication is applied for the uploaded objects after enabling the replication rule.

In the following, I will demonstrate some of the capabilities of S3 replication through illustrations and a hands-on that will be refined as we progress. We will begin by replicating non-encrypted objects between accounts, then move on to replicating delete markers between accounts, and finally, we will cover the replication of KMS-encrypted objects.

Thanks to Guille Ojeda's amazing newsletter for inspiring this article. I highly recommend following him on LinkedIn and subscribing to his newsletter.

A. S3 Replication of Non-encrypted Objects across accounts

Image description

To set up cross-account S3 replication, you'll need two separate accounts and buckets - one for the source and one for the destination. You need to enable versioning in the two buckets. Next, create a replication rule and specify your options. You'll also need to set permissions on both sides of the relationship:

  • In the source account, create a role that the S3 service can assume to replicate objects. This role must be authorized to read from the source bucket and replicate to the destination bucket.
  • In the destination account, make sure the destination bucket's policy allows the source account's S3 role to replicate objects.

Permissions can be tricky, so be carefulšŸ˜Š!

Letā€™s try it!

1. Create a bucket in each of the two accounts, and make sure to choose meaningful names to avoid confusion šŸ˜

2. Enable versioning for both buckets.

3. In the management part of the source bucket, create the replication rule.

We'll mainly use the default options.

Choose a Name for the replication rule
Image description

Choose to replicate all objects in the bucket

Image description

Choose to replicate on another account.
Provide the account ID and bucket name of the destination where you would like to transfer the data.

Image description

Choose the IAM role for S3 to be created automatically.

Image description

Keep the other options as default

Image description

After you confirm the creation of the replication rule, you will receive a message regarding your decision about the existing objects in the source bucket before enabling the replication.They are not replicated automatically.
This is particularly helpful when you already have objects in the source bucket!

Image description

That's not all! While we have the necessary permissions and configuration in the source account, the destination bucket needs to authorize the created S3 role to replicate objects. Therefore, we must copy the name of the role and update the bucket policy of the destination bucket.

Copy the S3 role name from the details of the replication rule

Image description

In the destination account, update the bucket policy of the destination bucket

Image description

We have everything required for replication. You can upload a file into the source bucket and await its appearance in the destination bucket. Objects replicate within 15 minutes.

Image description

B. What happens in the destination bucket when we delete an object from the source bucket?

Try it before reading the next part! Donā€™t forget to toggle on the show version!

When we enable versioning in a bucket, and we delete an object, the object isnā€™t deleted permanently. Instead, a delete marker (placeholder) is added as the current version of your object. The Delete Marker makes AWS S3 behave as if the object has been deleted.

Amazon S3 does not replicate the delete marker by default. However, you can add delete marker replication to non-tag-based rules. The delete marker replication is applied for the uploaded objects after its enablement. Depending on your case and your goal behind the replication, you choose to replicate delete markers or not.

In our case, the delete marker is added in the source and not replicated in the destination bucket. Letā€™s make the changes in our configuration to make it possible.

Update the replication rule of the source account to enable delete marker replication. Thatā€™s all you need to do

Image description

Now, when you delete an object from the source account, the delete marker is added to the source and replicated to the destination bucket

Image description

Remark!
If you delete an object version, Amazon S3 deletes that object version in the source bucket permanently. But it doesn't replicate the deletion in the destination buckets, even when you enable delete marker replication. This protects data from malicious deletions.

C. How can I update our configuration to enable the replication of KMS-encrypted objects across accounts (same region)?

Image description

AWS Key Management Service (AWS KMS) lets you create, manage, and control cryptographic keys across your applications and AWS services.

When we have to replicate encrypted objects, we need two KMS keys in the source and destination account and there are more permissions to set up than in the case of no encrypted objects.

The S3 role must now also be allowed to use and decrypt objects in the source bucket using the KMS SourceKey and to use and encrypt them in the destination bucket using the KMS DestinationKey

Letā€™s make the changes to be able to replicate KMS-encrypted objects with different KMS keys in the two accounts!

In this hands-on, I created two KMS keys in the source and destination account, but if you already have keys, you can use them and jump to step 3. You should only pay attention to keys permissions!

Create a KMS key in the source account

Give an alias (name) for your key and keep all other options as default.

You may need to update the key policy. For me, I kept the default policy key as I used an Adminstrator Access IAM user for this hands-on. This authorized me to allow S3 to encrypt objects using the created KMS key. If you have some permission troubles in the following steps, check the key policy and your permissions.

Image description

Create a KMS key in the destination account.

Give an alias (name) for your key, you must give the authorization to the source account (using console or JSON policy) to use it and keep all other options as default.

Image description

Update the source bucket properties to enable default encryption by the source KMS key

Image description

Or, you can specify the encryption using the KMS key when uploading an object to the source bucket, without updating the bucket's default encryption.

Image description

Image description

Update the replication rule
Allow replicating the encrypted objects and encrypt them in the destination bucket using the destination key

Image description

Update the S3 role
The role must have permission to decrypt with the source account KMS key and to encrypt with the destination account key. So, you need to add the following permissions to the S3 role

Image description

CongratulationsšŸ‘! You have successfully configured everything you need to replicate encrypted objects within the same region across two accounts. You can verify the results!
(The image below is composed from four screenshots to show the final result)

Image description

Conclusion
S3 replication is a powerful feature that you can use when you need to replicate data between S3 buckets.

The hands-on I provided is done in different accounts within the same region. Try to find what changes to make in the configuration to make it possible in different regions for encrypted and non-encrypted objects.

Happy learning!

Top comments (0)