Ensure other AWS accounts in bucket policies have restricted permissions.
Rule | Amazon S3 permissions granted to other AWS accounts in bucket policies should be restricted |
Framework | AWS Foundational Security Best Practices |
Severity | ✔ High |
Rule Description
AWS recommends restricting permissions granted to other AWS accounts in Amazon S3 bucket policies to ensure proper security and adhere to AWS Foundational Security Best Practices.
Rule Explanation
Granting excessive permissions to other AWS accounts in Amazon S3 bucket policies can potentially compromise data security, increasing the risk of unauthorized access or data leaks. To mitigate this risk, it is important to follow AWS Foundational Security Best Practices and restrict permissions to only those accounts that require access.
Remediation Steps
Follow the steps below to remediate this issue and restrict permissions granted to other AWS accounts in Amazon S3 bucket policies:
Step 1: Identify the affected bucket policies
Step 2: Review the bucket policies
Step 3: Modify the bucket policies
Step 4: Verify the updated permissions
Troubleshooting Steps
If you encounter any issues during the remediation process, follow these troubleshooting steps:
Additional Considerations