What is a Custom S3 Bucket?
A custom S3 bucket allows Enterprise customers to store their Rive file and asset data in their own AWS environment instead of Rive’s default storage. This premium feature gives you greater control over your data, allowing you to:- Apply your organization’s security and compliance policies
- Keep data within your existing AWS infrastructure
- Integrate with your existing backup and disaster recovery processes
- Monitor and audit all access to your bucket using CloudTrail
Configuration
1
Create an S3 bucket in your AWS Account
Follow the AWS documentation to create a new S3 bucket:
- Choose a unique name for your bucket
Note: Use that name in place ofBUCKET_NAME
for the rest of this document - Configure basic bucket settings
- Block public access
- You can choose to leave everything as default or you can decide to enable or customize:
- versioning (disabled by default)
- encryption - by default buckets and new objects are encrypted by Amazon’s S3 managed keys (SSE-S3) which uses AES256
- tags
2
Create an IAM Policy
- In the AWS Console, under IAM / Policies click on “Create policy”
- Select the “JSON” Policy Editor view and paste the following:
3
Create a new IAM Role
- In the AWS Console, under IAM / Roles click on “Create role”
- Under “Trusted entity type” pick “Custom trust policy”
- In the JSON editor that appears paste the following:
REQUEST_FROM_RIVE
from your Rive representative- Hit “Next” to go to the “Add permissions” section
- Under “Permission policies” search for the IAM Policy you just created and select it
- Click “Next” to go to “Name, review, and create”
- Choose a name, review the trust policy and the permissions, and click “Create role”
- Open the Role you just created and make note of the ARN
4
Provide Information to Rive
Share the following information with your Rive representative:
- Region: Region of the S3 Bucket
- Bucket Name: Name of the Bucket
- Role ARN: ARN of the role you created
Troubleshooting
If you encounter issues with your S3 bucket configuration:- Verify the IAM Role has the correct trust relationship (using the value provided by Rive)
- Ensure the IAM Policy has the necessary S3 permissions
- Check that your bucket is in the same region you provided to Rive
- Contact your Rive representative for additional assistance