How IP allow-listing works
Think of an IP allow-list as a digital gatekeeper for your data. By applying an IP-based policy to your storage bucket, you are instructing your cloud provider to check the source of every incoming request. If the request originates from an IP address on your approved list (in this case, Labelbox’s servers), it is allowed to proceed. If the request comes from any other IP address, it is immediately rejected, adding a network-level layer of security. This policy works in conjunction with IAM Delegated Access, meaning a request is only successful if it both comes from a Labelbox IP address and correctly assumes the IAM role you configured.Labelbox server IP addresses
To configure your allow-list, you will need the following list of Labelbox’s egress IP addresses.Step-by-step implementation guides
AWS S3
For AWS S3 buckets, use an IP address bucket policy (Amazon AWS docs) to permit access to specific addresses.- Navigate to the Amazon S3 console and select the bucket you have connected to Labelbox.
- Go to the Permissions tab.
- Scroll down to the Bucket policy section and click Edit.
-
Add the following JSON policy to the editor. This policy explicitly denies all
GetObjectactions unless the request comes from one of Labelbox’s IP addresses. Remember to replaceYOUR-BUCKET-NAMEwith the actual name of your S3 bucket.
Google Cloud Platform (GCP)
In GCP, IP-based restrictions are typically managed at the network level using VPC Service Controls. This allows you to create a secure perimeter around your projects and data.- Identify or Create a Service Perimeter: Navigate to the VPC Service Controls page in the Google Cloud Console. You can either add rules to an existing perimeter or create a new one that includes the project containing your GCS bucket.
- Configure an Ingress Rule: Within your perimeter configuration, create an ingress rule. This rule defines what is allowed to access the services inside the perimeter from the outside.
- Set the Source: In the “From” attributes of the ingress rule, select IP subnets as the source.
- Add Labelbox IPs: Add the list of Labelbox Server IP Addresses to the specified IP subnets.
- Set the Service: In the “To” attributes, specify the services the source is allowed to access. At a minimum, this should include the “Storage API” (
storage.googleapis.com). - Save your perimeter configuration.
Microsoft Azure
In Azure, you can restrict access to your Blob Storage account by configuring its built-in firewall.- Navigate to your Storage Account in the Azure Portal.
- In the left-hand navigation pane, under Security + networking, select Networking.
- Under the Firewalls and virtual networks tab, select the option for “Enabled from selected virtual networks and IP addresses”.
- Add Labelbox IPs: In the Firewall section, there is an Address range text box. Add the Labelbox Server IP Addresses to this list in CIDR notation (e.g.,
35.232.254.112/32). You will need to add each IP address individually. - Click Save. The firewall will now block all traffic that does not originate from the specified IP addresses.