AWS::S3::Bucket ServerSideEncryptionByDefault - AWS CloudFormation

AWS::S3::Bucket ServerSideEncryptionByDefault

Describes the default server-side encryption to apply to new objects in the bucket. If a PUT Object request doesn't specify any server-side encryption, this default encryption will be applied. For more information, see PUT Bucket encryption in the Amazon Simple Storage Service API Reference.


To declare this entity in your AWS CloudFormation template, use the following syntax:


{ "KMSMasterKeyID" : String, "SSEAlgorithm" : String }


KMSMasterKeyID: String SSEAlgorithm: String



KMS key ID to use for the default encryption. This parameter is allowed if SSEAlgorithm is aws:kms.

You can specify the key ID or the Amazon Resource Name (ARN) of the CMK. However, if you are using encryption with cross-account operations, you must use a fully qualified CMK ARN. For more information, see Using encryption for cross-account operations.

For example:

  • Key ID: 1234abcd-12ab-34cd-56ef-1234567890ab

  • Key ARN: arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab


Amazon S3 only supports symmetric CMKs and not asymmetric CMKs. For more information, see Using Symmetric and Asymmetric Keys in the AWS Key Management Service Developer Guide.

Required: No

Type: String

Update requires: No interruption


Server-side encryption algorithm to use for the default encryption.

Required: Yes

Type: String

Allowed values: AES256 | aws:kms

Update requires: No interruption

See also