You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/aws/cis-1.4.0/rules/aws-cis-1.4.0-2.1.5.1.ts
+19-74Lines changed: 19 additions & 74 deletions
Original file line number
Diff line number
Diff line change
@@ -1,43 +1,10 @@
1
1
exportdefault{
2
-
id: 'aws-cis-1.4.0-2.1.5',
3
-
title: 'AWS CIS 2.1.5 Ensure that S3 Buckets are configured with \'Block public access (bucket settings)\'',
2
+
id: 'aws-cis-1.4.0-2.1.5.1',
3
+
title: 'AWS CIS 2.1.5.1 Ensure that S3 Buckets are configured with \'Block public access (bucket settings)\' (account settings)',
4
4
5
5
description: 'Amazon S3 provides Block public access (bucket settings) and Block public access (account settings) to help you manage public access to Amazon S3 resources. By default, S3 buckets and objects are created with public access disabled. However, an IAM principal with sufficient S3 permissions can enable public access at the bucket and/or object level. While enabled, Block public access (bucket settings) prevents an individual bucket, and its contained objects, from becoming publicly accessible. Similarly, Block public access (account settings) prevents all buckets, and contained objects, from becoming publicly accessible across the entire account.',
6
6
7
-
audit: `**If utilizing Block Public Access (bucket settings)**
8
-
**From Console:**
9
-
10
-
1. Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
11
-
2. Select the Check box next to the Bucket.
12
-
3. Click on 'Edit public access settings'.
13
-
4. Ensure that block public access settings are set appropriately for this bucket
14
-
5. Repeat for all the buckets in your AWS account.
If the output reads false for the separate configuration settings then proceed to the remediation.
38
-
39
-
**If utilizing Block Public Access (account settings)**
40
-
**From Console:**
7
+
audit: `**From Console:**
41
8
42
9
1. Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
43
10
2. Choose Block public access (account settings)
@@ -61,33 +28,11 @@ export default {
61
28
62
29
If the output reads *false* for the separate configuration settings then proceed to the remediation.`,
63
30
64
-
rationale: `Amazon S3 Block public access (bucket settings) prevents the accidental or malicious public exposure of data contained within the respective bucket(s).
65
-
66
-
Amazon S3 Block public access (account settings) prevents the accidental or malicious public exposure of data contained within all buckets of the respective AWS account.
31
+
rationale: `Amazon S3 'Block public access (account settings)' prevents the accidental or malicious public exposure of data contained within all buckets of the respective AWS account.
67
32
68
33
Whether blocking public access to all or some buckets is an organizational decision that should be based on data sensitivity, least privilege, and use case.`,
69
34
70
-
remediation: `**If utilizing Block Public Access (bucket settings)**
71
-
**From Console:**
72
-
73
-
1. Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
74
-
2. Select the Check box next to the Bucket.
75
-
3. Click on 'Edit public access settings'.
76
-
4. Click 'Block all public access'
77
-
5. Repeat for all the buckets in your AWS account that contain sensitive data.
78
-
79
-
**From Command Line:**
80
-
81
-
1. List all of the S3 Buckets
82
-
83
-
aws s3 ls
84
-
85
-
2. Set the Block Public Access to true on that bucket
title: 'AWS CIS 2.1.5.2 Ensure that S3 Buckets are configured with \'Block public access (bucket settings)\' (bucket settings)',
4
+
5
+
description: 'Amazon S3 provides Block public access (bucket settings) and Block public access (account settings) to help you manage public access to Amazon S3 resources. By default, S3 buckets and objects are created with public access disabled. However, an IAM principal with sufficient S3 permissions can enable public access at the bucket and/or object level. While enabled, Block public access (bucket settings) prevents an individual bucket, and its contained objects, from becoming publicly accessible. Similarly, Block public access (account settings) prevents all buckets, and contained objects, from becoming publicly accessible across the entire account.',
6
+
7
+
audit: `**From Console:**
8
+
9
+
1. Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
10
+
2. Select the Check box next to the Bucket.
11
+
3. Click on 'Edit public access settings'.
12
+
4. Ensure that block public access settings are set appropriately for this bucket
13
+
5. Repeat for all the buckets in your AWS account.
If the output reads false for the separate configuration settings then proceed to the remediation.`,
37
+
38
+
rationale: `Amazon S3 'Block public access (bucket settings)' prevents the accidental or malicious public exposure of data contained within the respective bucket(s).
39
+
40
+
Whether blocking public access to all or some buckets is an organizational decision that should be based on data sensitivity, least privilege, and use case.`,
41
+
42
+
remediation: `**From Console:**
43
+
44
+
1. Login to AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
45
+
2. Select the Check box next to the Bucket.
46
+
3. Click on 'Edit public access settings'.
47
+
4. Click 'Block all public access'
48
+
5. Repeat for all the buckets in your AWS account that contain sensitive data.
49
+
50
+
**From Command Line:**
51
+
52
+
1. List all of the S3 Buckets
53
+
54
+
aws s3 ls
55
+
56
+
2. Set the Block Public Access to true on that bucket
0 commit comments