This rule ensures that S3 buckets do not allow public read access to enhance data security.
Rule | S3 buckets should prohibit public read access |
Framework | RBI Cyber Security Framework |
Severity | ✔ Medium |
Description
This rule pertains to the RBI (Reserve Bank of India) Cyber Security Framework requirements for S3 buckets in the context of Amazon Web Services (AWS). The rule states that S3 buckets should prohibit public read access. This means that the contents of the S3 buckets should not be accessible to the public.
Policy Details
To comply with the RBI Cyber Security Framework requirements, all S3 buckets must have public read access disabled. This rule ensures that sensitive or confidential data stored in S3 buckets cannot be accessed by unauthorized users on the internet.
Public read access to S3 buckets can be misused by attackers to gain unauthorized access to confidential data, which can lead to data leaks, privacy breaches, and potential financial and reputational damage.
By enforcing this policy, you ensure that only authorized users or services can access the data stored in the S3 buckets, reducing the risk of data exposure and unauthorized access.
Troubleshooting Steps
If public read access is found enabled for an S3 bucket, the following troubleshooting steps can be followed to remediate the issue:
Remediation Steps
To remediate the issue and ensure that public read access is disabled for the S3 bucket(s), follow these steps:
Additional Information
It is also recommended to regularly monitor and audit the S3 bucket configurations for any changes that may introduce public read access. Implementing preventive measures, such as proactive monitoring and automated policy enforcement, can help maintain the integrity and security of S3 bucket configurations over time.
Additionally, it is advisable to educate and train users who have access to AWS resources about the importance of not granting public read access and the potential risks associated with such misconfigurations.