AWS S3
If you use AWS S3 to store data you can send attachments as https:
or http:
URLs. You can also send attachments as s3:
protocol URIs which look like s3://bucket/key
.
To access private s3 objects, We use Cross-account Access.
Cross-account Access
We will fetch attachments from your S3 bucket, using AWS account ID 475757276268
(canonical ID d4b5723a54db6f9da8a68f4c24233880793bf1d68dd11e7e2b4989bd2c71c59a
). You will need to grant access to TELUS International using bucket policies or on set permissions on objects using ACLs.
We suggest setting a Bucket Policy that shares the bucket's contents with the account of TELUS International.
Here's a sample bucket policy:
Replace YOUR_BUCKET_NAME
with the name of your bucket, leaving the /*
as shown or replacing it with a more specific bucket path to further restrict access.
If you are using ACLs (Access Control Lists), you need to update the ACL individually for each object to grant read access to our account, as Bucket ACLs can't grant read permissions to nested objects.
Granting access to an S3 bucket encrypted with KMS Key
If your S3 bucket uses Customer managed KMS keys for encryption(SSE-KMS), there's an additional step to grant TELUS International the necessary permissions:
IAM Policy on KMS Key: In addition to the bucket policy or ACLs, you need to modify the policy attached to the Customer KMS key used for encryption. This policy needs to allow IAM user of TELUS International to perform the following actions:
kms:GenerateDataKey: This grants TELUS International permission to generate data keys for encrypting/decrypting objects within your bucket.
kms:Decrypt: This allows TELUS International to decrypt objects retrieved from your S3 bucket.
Steps to update the KMS key policy:
Navigate to the AWS KMS console and select the KMS key used for your S3 bucket encryption.
Go to the "Key policy" section.
Edit the existing policy or create a new one.
Add the following :
Last updated