Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Object Storage
    • All guides
      • Creating a bucket
      • Deleting a bucket
      • Limiting the maximum size of a bucket
      • Encrypting a bucket
      • Managing object lifecycles
      • Managing CORS configurations
      • Configuring access permissions using IAM
      • Editing a bucket's ACL
      • Managing access policies
      • Configuring public access to a bucket
      • Disabling access with static keys
      • Accessing a bucket using Security Token Service
      • Accessing a bucket with an ephemeral access key
      • Accessing a bucket using a service connection from VPC
      • Managing bucket versioning
      • Enabling logging
      • Managing object locks
      • Managing bucket labels
      • Getting bucket information and statistics
      • Viewing bucket metrics
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Bucket logs
  • Release notes
  • FAQ
  1. Step-by-step guides
  2. Buckets
  3. Disabling access with static keys

Disabling static keys for access to a bucket

Written by
Yandex Cloud
Updated at February 24, 2026

Object Storage incorporates several access management mechanisms. To learn how these mechanisms interact, see Access management methods in Object Storage: Overview.

By default, one can access a bucket using static access keys. You can disable this access option to only allow access with an IAM token or anonymous access, if enabled in the bucket settings.

Note

Once disabled, access with static keys will be denied to all tools using this access option: the AWS CLI, SDK, and third-party applications. Access via ephemeral keys, temporary Security Token Service access keys, and pre-signed URLs will also be terminated.

The minimum required role to disable access with static keys is storage.admin. For more information, see the role description.

To disable bucket access with static keys, follow these steps:

Yandex Cloud CLI
API

If you do not have the Yandex Cloud CLI installed yet, install and initialize it.

By default, the CLI uses the folder specified when creating the profile. To change the default folder, use the yc config set folder-id <folder_ID> command. You can also set a different folder for any specific command using the --folder-name or --folder-id parameter.

  1. See the description of the CLI command for updating a bucket:

    yc storage bucket update --help
    
  2. Get a list of buckets in the default folder:

    yc storage bucket list
    

    Result:

    +------------------+----------------------+-------------+-----------------------+---------------------+
    |       NAME       |      FOLDER ID       |  MAX SIZE   | DEFAULT STORAGE CLASS |     CREATED AT      |
    +------------------+----------------------+-------------+-----------------------+---------------------+
    | first-bucket     | b1gmit33ngp6******** | 10737418240 | STANDARD              | 2025-11-20 09:45:36 |
    +------------------+----------------------+-------------+-----------------------+---------------------+
    
  3. Save the NAME of the bucket for which you want to disable access with static keys.

  4. Disable using static keys for bucket access:

    yc storage bucket update \
      --name <bucket_name> \
      --disable-statickey-auth true
    

    Where:

    • --name: Name of the bucket for which you need to disable access with static keys.
    • --disable-statickey-auth: Flag to disable access with static keys. It can either be true or false.

    Result:

    name: first-bucket
    folder_id: b1gmit33ngp6********
    default_storage_class: STANDARD
    versioning: VERSIONING_DISABLED
    max_size: "53687091200"
    acl: {}
    created_at: "2022-12-16T13:58:18.933814Z"
    disabled_statickey_auth: true
    

To disable bucket access with static keys, use the update REST API method for the Bucket resource or the BucketService/Update gRPC API call.

Run this query:

curl -X PATCH \
  -H "Content-Type: application/json" \
  -H "Authorization: Bearer <IAM_token>" \
  -d '{
       "updateMask":"disabledStatickeyAuth",
       "disabledStatickeyAuth":true
      }' \
"https://storage.api.cloud.yandex.net/storage/v1/buckets/first-bucket"

Where:

  • <bucket_name>: Name of the bucket for which you need to disable access with static keys.
  • <IAM_token>: IAM token of the user with the storage.admin role for the bucket.

Result:

{
  "done": true,
  "metadata": {
    "@type": "type.googleapis.com/yandex.cloud.storage.v1.UpdateBucketMetadata",
    "name": "first-bucket"
  },
  "response": {
    "@type": "type.googleapis.com/yandex.cloud.storage.v1.Bucket",
    "acl": {},
    "disabledStatickeyAuth": true,
    "name": "first-bucket",
    "folderId": "b1g07hj5r6i4********",
    "defaultStorageClass": "STANDARD",
    "versioning": "VERSIONING_DISABLED",
    "maxSize": "53687091200",
    "createdAt": "2025-11-20T09:45:36.230463Z",
    "resourceId": "e3eruofcbqc2********"
  },
  "id": "e3enqoaug76p********",
  "description": "update bucket",
  "createdAt": "2025-12-22T20:47:01.424654Z",
  "createdBy": "ajeb9l33h6mu********",
  "modifiedAt": "2025-12-22T20:47:01.424654Z"
}

Follow the status of the operation by the done field.

Was the article helpful?

Previous
Configuring public access to a bucket
Next
Accessing a bucket using Security Token Service
© 2026 Direct Cursus Technology L.L.C.