You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Uncheck "Block *all* public access" if you need publicly accessible image URLs (as shown in the screenshot)
40
-
- Note: For security, consider keeping public access blocked and using signed URLs or restricting access to specific IAM users
39
+
- For enhanced security, keep "Block all public access" enabled (recommended)
40
+
- If you need to access images from external systems, use IAM-based access controls or generate signed URLs rather than making the bucket public
41
+
- Only uncheck public access if you fully understand the security implications and need publicly accessible URLs (as shown in the screenshot)
41
42
42
43

43
44
@@ -90,7 +91,8 @@ Replace `your-bucket-name` with your actual bucket name.
90
91
91
92
4. Create access keys for this user and save them securely
92
93
- You'll receive an `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`
93
-
-**Important**: These credentials will only be shown once, so save them immediately
94
+
-**Important**: These credentials will only be shown once, so save them immediately to a secure password manager
95
+
-**Security best practice**: Rotate these credentials periodically and revoke them immediately if compromised
94
96
95
97
The a1_cam device generates URLs like:
96
98
```
@@ -132,7 +134,11 @@ s3 = boto3.client(
132
134
)
133
135
```
134
136
135
-
**Note**: While boto3 also supports reading credentials from `~/.aws/credentials` or environment variables, this implementation explicitly passes them to keep all device secrets centralized in `my_secrets.py`.
137
+
**Security considerations**:
138
+
- The `my_secrets.py` file stores credentials in plaintext. Ensure proper file permissions: `chmod 600 my_secrets.py`
139
+
- Keep your Raspberry Pi login credentials secure and use SSH key authentication
140
+
- Consider restricting SSH access and using fail2ban or similar tools
141
+
- While boto3 also supports reading credentials from `~/.aws/credentials` or environment variables, this implementation explicitly passes them to keep all device secrets centralized in `my_secrets.py`
0 commit comments