Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: S3 Public Access Blocked at Account Level

This rule ensures S3 public access is denied at the account level to enhance security measures.

RuleS3 public access should be blocked at account level
FrameworkFederal Financial Institutions Examination Council (FFIEC)
Severity
Medium

Rule Description:

This rule ensures that the S3 public access is blocked at the account level specifically for the Federal Financial Institutions Examination Council (FFIEC). By implementing this policy, it helps maintain the highest level of security and privacy for sensitive data stored within the S3 buckets associated with FFIEC.

Troubleshooting Steps:

If there are any issues related to the S3 public access being blocked for FFIEC, follow the steps below for troubleshooting:

  1. 1.

    Verify the account-level policy: Check if the account-level policy explicitly blocks public access for FFIEC. Ensure that the policy is configured correctly to deny any public access requests.

  2. 2.

    Verify S3 bucket policies: Ensure that there are no bucket policies granting public access within FFIEC-related S3 buckets. If any policies are found, remove them or modify accordingly to block public access.

  3. 3.

    Review Access Control Lists (ACLs): Ensure that the ACLs associated with FFIEC-related S3 buckets do not grant public access permissions. Modify the ACLs if required to restrict access to authorized entities only.

  4. 4.

    Check Public Access Block configuration: Confirm that the Public Access Block settings are enabled for all S3 buckets containing FFIEC data. Adjust the configuration as necessary to block public access.

  5. 5.

    Audit S3 bucket permissions: Regularly review and audit the permissions associated with FFIEC-related S3 buckets. Identify any entities with excessive or unnecessary access rights and revoke or modify their permissions accordingly.

  6. 6.

    Monitor S3 access logs: Enable S3 access logging and regularly monitor the logs for any public access attempts. Investigate and remediate any unauthorized access incidents promptly.

Necessary Code:

There's no specific code provided for this rule as it involves configuring and managing AWS services using their respective console, CLI, or SDKs. However, we can provide the necessary CLI commands to help you implement and remediate this rule.

Remediation Steps:

Follow the steps below to remediate and ensure S3 public access is blocked at the account level for FFIEC.

  1. 1.

    Open the AWS Management Console and navigate to the Amazon S3 service.

  2. 2.

    Select each S3 bucket associated with FFIEC.

  3. 3.

    Review the bucket policies and remove any policies that allow public access. Use the following command to remove the bucket policy using AWS CLI:

aws s3api delete-bucket-policy --bucket <bucket-name>
  1. 1.
    Review the ACLs of the buckets and modify them to block public access. Use the following command to modify the ACL:
aws s3api put-bucket-acl --bucket <bucket-name> --acl private
  1. 1.
    Enable Public Access Block configuration for each bucket. Use the following command to enable blocking of public access:
aws s3api put-public-access-block --bucket <bucket-name> --public-access-block-configuration "BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true"
  1. 1.

    Repeat steps 2-5 for all relevant S3 buckets associated with FFIEC.

  2. 2.

    Regularly monitor and audit the buckets' permissions and access logs to ensure ongoing adherence to the policy.

By following these steps, you can effectively block S3 public access at the account level for FFIEC and maintain the desired level of security.

Is your System Free of Underlying Vulnerabilities?
Find Out Now