Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Rule: S3 Buckets Should Prohibit Public Read Access

This rule ensures S3 buckets restrict public read access to enhance security measures.

RuleS3 buckets should prohibit public read access
FrameworkSOC 2
Severity
Medium

Rule Description

This rule ensures that S3 buckets do not allow public read access, in compliance with the SOC 2 security standard. Public read access means that anyone on the internet can view the objects stored in the bucket, which can lead to unauthorized access and potential data breaches.

Remediation Steps

To remediate this issue and prohibit public read access for the S3 buckets, follow the steps below:

Step 1: Identify the S3 Buckets

First, you need to identify the S3 buckets that have public read access enabled. To do this, you can use the AWS Command Line Interface (CLI) or the AWS Management Console.

CLI Command:

aws s3api list-buckets

This command will list all the S3 buckets in your AWS account.

Step 2: Update Bucket ACL or Policy

Once you have identified the S3 buckets with public read access, you need to update their access control lists (ACLs) or bucket policies to revoke public read permissions.

Option 1: Updating Bucket ACL

CLI Command:

aws s3api put-bucket-acl --bucket bucket-name --acl private

Replace

bucket-name
with the name of the S3 bucket you want to update.

This command will update the bucket's ACL and set the access control to private, thereby revoking public read access.

Option 2: Updating Bucket Policy

If the S3 bucket has a bucket policy allowing public read access, you need to update the policy to deny public read permissions.

Step 2.1: Retrieve the Bucket Policy

Use the following CLI command to retrieve the bucket policy:

CLI Command:

aws s3api get-bucket-policy --bucket bucket-name

Replace

bucket-name
with the name of the S3 bucket you want to update.

Step 2.2: Modify the Bucket Policy

Edit the bucket policy to deny public read access to the bucket. Remove any statements that grant public read access. Ensure that you retain any necessary permissions for authorized users or services.

Step 2.3: Update the Bucket Policy

Use the following CLI command to update the bucket policy:

CLI Command:

aws s3api put-bucket-policy --bucket bucket-name --policy file://path/to/policy.json

Replace

bucket-name
with the name of the S3 bucket you want to update, and
path/to/policy.json
with the local file path to the modified policy JSON file.

This command will update the bucket policy with the modified policy JSON file, effectively revoking public read access.

Troubleshooting Steps

  • If the AWS CLI commands mentioned above are not working, ensure that you have the necessary IAM permissions to manage S3 buckets and policies.
  • Double-check the bucket names and policy syntax to ensure there are no discrepancies or typos.
  • Review the AWS documentation for S3 bucket ACLs and policies for any additional troubleshooting steps specific to your use case.

Remember to regularly audit your S3 bucket access controls to ensure they align with the SOC 2 compliance requirements and best practices for security.

Is your System Free of Underlying Vulnerabilities?
Find Out Now