Troubleshoot SSE-KMS with VPC Endpoint Errors

If Data 360 fails to retrieve encrypted objects after you apply VPC endpoint or KMS policies, use this table to identify and resolve common issues.

SymptomLikely CauseResolution
AccessDenied or KMS.AccessDeniedException on encrypted object retrieval after adding VPC restrictionsaws:SourceVpce or aws:SourceVpc condition added to the KMS key policyRemove the VPC condition from your KMS key policy. Apply it to your S3 bucket policy as a Deny statement scoped to the Data 360 IAM user with your VPCE ID.
Retrieval works without VPC restriction but fails after security hardeningSecurity team added VPC restrictions to both bucket and KMS policiesCheck your KMS key policy for VPC conditions and remove them. Verify that your bucket policy has a Deny statement for the Data 360 IAM user with the VPCE condition.
Intermittent access failures after a policy changeIAM policy propagation delay or cached credentialsWait 5–10 minutes for policy changes to propagate, then retry. Verify all three policies (bucket, KMS, IAM) are consistent.
AccessDenied even though the VPC condition is only on the bucket policyThe Data 360 IAM user lacks S3 permissions or KMS decrypt accessVerify that the IAM user has S3 access (via bucket policy Allow or identity-based policy) and that the KMS key policy grants decrypt access to the IAM user's ARN.
Access works but kms:ViaService condition is missing from key policyKMS key policy is overly permissiveAdd the kms:ViaService condition to restrict KMS access to S3 service calls only. This condition tightens your security posture.