Many AWS customers receiving following email from AWS:
Hello,We're writing to remind you that one or more of your Amazon S3 bucket access control lists (ACLs) are currently configured to allow read access from any user on the Internet. The list of buckets with this configuration is below.By default, S3 bucket ACLs allow only the account owner to list the bucket or write/delete objects; however, these ACLs can be configured to permit public read access. While there are reasons to configure buckets with public read access, including public websites or publicly downloadable content, recently there have been public disclosures by third parties of S3 bucket contents that were inadvertently configured to allow public read access but were not intended to be publicly available.We encourage you to promptly review your S3 buckets and their contents to ensure that you are not inadvertently making objects visible to users that you don't intend. Bucket ACLs can be reviewed in the AWS Management Console (http://console.aws.amazon.com), or using the AWS CLI tools. ACLs permitting "All Users" grant public read access to the related content.For more information on configuring your bucket ACLs, please visit: https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.htmlFor additional assistance reviewing your bucket ACLs, please visit http://aws.amazon.com/support to create a case with AWS Developer Support.Your list of buckets configured to allow read access from anyone on the Internet are:[redacted]
CIS have a tool that checks AWS security...it can check open S3 buckets:
Prowler: AWS CIS Benchmark Tool: https://github.com/ Alfresco/prowler
https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf
Another option to check S3 security is Cloudberry Explorer that features S3 security assessment:
No comments:
Post a Comment