I'm trying to use server side encryption having AWS KMS setup to upload objects to S3.
The documentation says that the uploaded objects should be encrypted;
Server-side encryption is about data encryption at rest—that is, Amazon S3 encrypts your data at the object level as it writes it to disks in its data centers and decrypts it for you when you access it.
I've setup KMS master key and trying to use CLI to upload an object in the following way
aws s3api put-object --bucket test --key keys/test.txt --server-side-encryption aws:kms --ssekms-key-id <my_master_Key_id> --body test.txt
The upload succeeds and I see the following response
{
"SSEKMSKeyId": "arn:aws:kms:eu-central-1:<id>:key/<my_master_key>",
"ETag": "\"a4f4fdf078bdd5df758bf81b2d9bc94d\"",
"ServerSideEncryption": "aws:kms"
}
Also when checking the file in S3 I see in details that it has been encrypted server side with a proper master key.
The problem is that when I download the file with a user not having a permission to use the KMS master key, I can open and read the file without a problem, when it should be encrypted.
Note: I also have PutObject policy denying all uploads without server-side encryption, which works fine.
I wonder if I misunderstand the server side encryption, or do I do something wrong? Any help is appreciated.