Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: S3 Public Access Blocked at Account Level

This rule ensures that S3 public access is blocked at the account level to enhance security measures.

RuleS3 public access should be blocked at account level
FrameworkFedRAMP Low Revision 4
Severity
Medium

Rule Description:

The rule dictates that public access to Amazon S3 (Simple Storage Service) should be blocked at the account level, specifically for FedRAMP Low Revision 4 compliance. This is to ensure that no unauthorized access or exposure of sensitive data occurs, and it aligns with the security requirements set forth by the Federal Risk and Authorization Management Program (FedRAMP).

Troubleshooting Steps (if applicable):

If you encounter any issues while implementing or verifying this rule, follow the steps below for troubleshooting:

  1. 1.

    Double-check the account-level permissions: Ensure that the account has sufficient permissions to modify the S3 access policy. Verify that the IAM (Identity and Access Management) user or role attempting the change has the necessary permissions for account-level actions.

  2. 2.

    Review existing S3 bucket policies: Check if any S3 bucket policies are permitting public access. If found, modify the policies to restrict public access or consider deleting those policies altogether.

  3. 3.

    Analyze S3 access logs: Enable Amazon S3 access logging for relevant buckets and review the logs for any unexpected or unauthorized access attempts. This step helps identify and mitigate potential security risks.

  4. 4.

    Test public access: Attempt to access the S3 buckets from an external network or without any authentication. If successful, identify the misconfiguration and take corrective actions.

  5. 5.

    Utilize AWS Trusted Advisor: Leverage the AWS Trusted Advisor service to gain insights into any security vulnerabilities or compliance issues related to S3 public access. Follow the recommendations provided by Trusted Advisor to remediate the identified issues.

Necessary Codes (if applicable):

There are no specific codes associated with blocking S3 public access at the account level for FedRAMP Low Revision 4 compliance. Instead, the implementation requires utilizing AWS S3 service configurations and policies.

Step-by-Step Guide for Remediation:

Follow the steps below to block S3 public access at the account level for FedRAMP Low Revision 4 compliance:

  1. 1.

    Sign in to the AWS Management Console using appropriate credentials.

  2. 2.

    Open the Amazon S3 console.

  3. 3.

    Click on the "Account Settings" option located in the top-right corner of the console.

  4. 4.

    In the "Account Settings" page, scroll down to the "Public access settings for this account" section.

  5. 5.

    Verify that the "Block all public access" toggle is turned ON. If not, toggle it ON.

  6. 6.

    Review the warning message regarding the impact of blocking public access. Make sure you understand the implications before proceeding.

  7. 7.

    Click on the "Edit" button to modify the public access settings.

  8. 8.

    In the "Edit public access settings" dialog box, confirm that "Block all public access" is selected.

  9. 9.

    Scroll down and check the acknowledgment boxes for the changes you are about to make.

  10. 10.

    Click on the "Save" button to apply the changes.

  11. 11.

    Validate the changes by testing access to S3 buckets from external networks or unauthorized users.

  12. 12.

    Repeat the above steps for all AWS accounts within the scope of FedRAMP Low Revision 4 compliance.

By following these steps, public access to S3 buckets within the AWS accounts will be blocked, ensuring compliance with FedRAMP Low Revision 4 requirements.

Is your System Free of Underlying Vulnerabilities?
Find Out Now