This rule ensures that the S3 bucket used to store CloudTrail logs is secure and not accessible to the public.
Rule | Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible |
Framework | cis_v140 |
Severity | ✔ Critical |
Rule Description:
The rule "cis_v140" ensures that the S3 bucket used to store CloudTrail logs is not publicly accessible. Publicly accessible buckets may expose sensitive information to unauthorized entities, compromising the security and confidentiality of log data.
Remediation:
To remediate this issue, you need to update the S3 bucket's permissions and access control settings to restrict public access. Follow the steps below:
Step 1: Identify the affected S3 bucket
Step 2: Review the bucket permissions
Troubleshooting:
If you cannot find the bucket, ensure that you are checking the correct AWS region and have appropriate permissions to access the bucket.
Step 3: Update the bucket policy
Troubleshooting:
If you do not have access to modify the bucket policy, contact your AWS account administrator for the necessary permissions.
Step 4: Remove public access permissions
Step 5: Enable block all public access settings
Troubleshooting:
The "Access control" tab might not be available if you do not have the required permissions. Contact your AWS account administrator for assistance.
Step 6: Configure block public access settings
Step 7: Verify the changes
Troubleshooting:
If the bucket policy still allows public access or the block public access settings are not enabled, repeat the previous steps and ensure that all changes are saved correctly.
Verification:
To verify if the S3 bucket used for storing CloudTrail logs is no longer publicly accessible, you can perform the following steps:
If the bucket is no longer publicly accessible, you have successfully remediated the issue.
Additional Notes:
Remember to regularly review your S3 bucket access controls and permissions to ensure the ongoing security of your CloudTrail logs. Monitoring and auditing your AWS environment for any changes to bucket policies or security configurations is also recommended.