This rule ensures blocking S3 public access at bucket levels to enhance security measures.
Rule | S3 public access should be blocked at bucket levels |
Framework | NIST 800-53 Revision 5 |
Severity | ✔ High |
Rule Description:
This rule dictates that the public access to objects in an S3 bucket should be blocked at the bucket level. It is aligned with the security requirements of NIST 800-53 Revision 5, which aims to ensure the confidentiality, integrity, and availability of sensitive data stored in AWS S3.
Troubleshooting Steps:
Code Example:
To enforce the blocking of public access at the bucket level, you can use the following AWS CLI command:
aws s3api put-public-access-block --bucket your-bucket-name --public-access-block-configuration "BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true"
Remediation Steps:
Follow the steps below to remediate the S3 bucket and block public access at the bucket level:
By following these steps, you will effectively block public access at the bucket level for NIST 800-53 Revision 5 compliance.