Three months too late, but I came across this same issue recently. I was able to get it working with the following policy:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListBucket",
"s3:GetBucketLocation"
],
"Resource": [
"arn:aws:s3:::<bucketname>"
]
},
{
"Effect": "Allow",
"Action": [
"s3:GetObject",
"s3:PutObject",
"s3:DeleteObject"
],
"Resource": [
"arn:aws:s3:::<bucketname>/*"
]
}
]
}
This removes the capability to list all buckets, bucket locations, and objects in an account while still granting rights to the specific bucket.
I also left out the "s3:PutObjectTagging" operation on the objects in the specified bucket, haven't seen any errors from Kentico yet. Does Kentico try to tag objects it creates in S3 buckets?