Wednesday, 8 June 2016

Check for AWS S3 misconfiguration



Misconfiguration often applied on AWS S3 bucket policy. This misconfiguration is due to the default Grantee permission of "Authenticated Users" assigned to S3 bucket policy when the bucket is created. This permission is little misleading and allows any users who has AWS account regardless if that user is from your organization. Similarly, any S3 bucket policy should not include Grantee permission of "Everyone", as this would allow anonymous access to such s3 bucket.

S3 buckets have Grantee permission of "Authenticated Users" (AllUsers): assigned to S3 bucket:

for b in `aws s3 ls | awk ' { print $3 } '`; do  echo -e "===============================================================================\nBucket=$b\n\n"; aws s3api get-bucket-acl --bucket $b; done

No comments:

Post a Comment