This rule ensures blocking of S3 public access at account and bucket levels.
Rule | S3 public access should be blocked at account and bucket levels |
Framework | NIST Cybersecurity Framework (CSF) v1.1 |
Severity | ✔ Medium |
Rule Description:
The rule mandates blocking public access to all Amazon S3 buckets at both the account and bucket levels, in accordance with the guidelines provided by the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) v1. This rule helps ensure data security and privacy by preventing unauthorized access to S3 buckets and their contents.
Troubleshooting Steps:
Necessary Codes:
No specific codes are required for this rule. However, you may need to update the bucket policies or access control lists (ACLs) if public access is detected and needs to be blocked.
Step-by-Step Guide for Remediation:
Checking for Bucket-Level Public Access:
Checking for Account-Level Public Access (if using AWS Organizations):
Conclusion:
Following the NIST Cybersecurity Framework (CSF) v1 guidelines, it is crucial to block public access to Amazon S3 buckets at both the account and bucket levels. By diligently reviewing and updating the bucket policies, access control lists (ACLs), and account-level settings, you can ensure the security and privacy of your S3 data.