I have indeed found that it's difficult to silo access to specific resources with AWS IAM.
I use these custom policies a lot, which give write access to a specific S3 Bucket [0], and give sending capabilities for a specific SES Identity [1] respectively:
I use these custom policies a lot, which give write access to a specific S3 Bucket [0], and give sending capabilities for a specific SES Identity [1] respectively:
[0]https://koptional.notion.site/IAM-Policy-for-select-S3-Acces...
[1] https://koptional.notion.site/IAM-Policy-for-email-sending-o...