This rule ensures S3 public access is blocked at the account level for security and compliance purposes.
Rule | S3 public access should be blocked at account level |
Framework | NIST 800-171 Revision 2 |
Severity | ✔ Medium |
Rule Description
This rule enables the prevention of public access to Amazon S3 (Simple Storage Service) buckets and objects at the account level in order to comply with the security requirements specified in NIST (National Institute of Standards and Technology) 800-171 Revision 2.
Troubleshooting Steps
If you encounter any issues while implementing this rule, you can follow these troubleshooting steps:
Necessary Codes
No specific codes are required for this rule. It can be implemented using AWS Management Console or AWS CLI commands.
Step-by-Step Remediation Guide
Follow these step-by-step instructions to block public access to S3 at the account level:
AWS Management Console:
AWS CLI:
Install and configure the AWS CLI (Command Line Interface) if you haven't already.
Open the Command Prompt, Terminal, or any command-line interface.
Type the following command to update the account-level public access block settings for S3:
aws s3control put-public-access-block --public-access-block-configuration "BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true"
Press Enter to execute the command.
Verify that the settings have been successfully updated by checking if there are no errors.
Note: The above commands assume you have the necessary permissions to update S3 bucket settings at the account level.
By following the above steps, you will successfully block public access to Amazon S3 buckets and objects at the account level, thereby complying with the NIST 800-171 Revision 2 security requirements.