You can access an S3 bucket in your connected AWS VPC by creating an S3 endpoint.


  1. Create an S3 endpoint.
    See Gateway VPC Endpoints and Endpoints for Amazon S3 in the Amazon Virtual Private Cloud User Guide.
    1. For Service category, select AWS services.
    2. Under Service Name, select a com.amazonaws.region-AZ.s3 service of type Gateway where region-AZ matches the region and AZ your SDDC is in. For example,
    3. In the VPC drop down, select the VPC that is connected to your SDDC.
    4. Under Configure route tables, select the Route Table ID where the value in the Main column is Yes. This Route Table is used by the SDDC and should also be associated with the VPC subnet the SDDC is connected to.
    5. Under Policy select the default Full Access policy or create a more restrictive one. See Endpoints for Amazon S3 in the Amazon Virtual Private Cloud User Guide. Traffic to S3 from the SDDC will have its source IP NATted to an IP from the subnet selected at SDDC deployment, so any policy must allow traffic from that subnet.
    6. Click Create Endpoint to create the endpoint and add routes for the S3 public IP ranges in the region to the main route table.
  2. (Optional) Configure the security group for your connected Amazon VPC to allow outbound traffic to the network segment associated with the VM in your SDDC.
    The default security group allows this traffic, so you won't need to take this step unless you previously customized the default security group.
    1. In the AWS console, select the default Security Group for the Connected Amazon VPC and click the Outbound tab.
    2. Click Edit.
    3. Click Add Rule.
    4. In the Type dropdown menu, select HTPPS.
    5. In the Destination text box, select Anywhere.
    6. Click Save.
  3. Ensure that access to S3 through the elastic network interface is enabled.
    By default, S3 access through the elastic network interface in the connected Amazon VPC is enabled. If you disabled this access to allow S3 access through the internet gateway, you must re-enable it.
    1. Log in to the VMC Console at
    2. Click > Connected VPC
    3. Under Service Access, click Enable next to S3 Endpoint.
  4. From the VMC Console, create a compute gateway firewall rule to allow https access to the connected Amazon VPC.
    1. Under Compute Gateway, click Firewall Rules.
    2. Add a compute gateway firewall rule with the following parameters.
      Option Description
      Source The CIDR block for the logical network that the VM in your SDDC is connected to.
      Destination Select S3 Prefixes.
      Service Select HTTPS.
      Applied to Clear All Uplinks and select VPC Interface.


Workload VMs in your SDDC can access files in the S3 bucket over an https connection.