1. Access Control Lists (ACLs):

2. Bucket Policies:

3. IAM Policies:

In summary: