This rule ensures S3 buckets restrict public read access for better security.
Rule | S3 buckets should prohibit public read access |
Framework | FedRAMP Low Revision 4 |
Severity | ✔ Medium |
S3 Buckets Prohibit Public Read Access for FedRAMP Low Revision 4
Overview
FedRAMP Low Revision 4 compliance requires that all Amazon S3 buckets should prohibit public read access to ensure data security and privacy. Public read access allows anyone on the internet to view or download content from an S3 bucket, which can lead to unauthorized access to sensitive information.
As part of this rule, AWS account administrators need to make sure that none of their S3 buckets are inadvertently open to the public.
Rule Description
Amazon S3 bucket policies and Access Control Lists (ACLs) should be configured to deny public read access. FedRAMP Low Rev. 4 demands the enforcement of a "least privilege" policy, which means providing just enough access to users to perform their duties.
A detailed description of the rule would entail:
*
with actions like s3:GetObject
.public-read
grant permission set.Remediation Steps
Review and Modify Bucket Policies
s3:GetObject
permission to *
(all principals).Example of a statement that allows public access:
{
"Effect": "Allow",
"Principal": "*",
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::examplebucket/*"
}
Review and Modify Bucket ACLs
Enable Block Public Access settings
Using AWS CLI for Remediation
If you have numerous buckets or prefer to automate the remediation process, you can use the AWS Command Line Interface (CLI).
aws s3api get-bucket-policy --bucket BUCKET_NAME aws s3api get-bucket-acl --bucket BUCKET_NAME
aws s3api put-bucket-policy --bucket BUCKET_NAME --policy 'POLICY_JSON'
aws s3api put-public-access-block --bucket BUCKET_NAME --public-access-block-configuration '{
"BlockPublicAcls": true,
"IgnorePublicAcls": true,
"BlockPublicPolicy": true,
"RestrictPublicBuckets": true
}'
Conclusion
Carefully manage S3 bucket permissions to ensure compliance with FedRAMP Low Rev. 4 requirements. Regular audits and the use of AWS's proactive security tools will help maintain the secure state of your S3 resources.