Simple Storage Service - S3 is storage for the internet. You can use Amazon S3 to store and retrieve any amount of data at any time, from anywhere on the web. You can accomplish these tasks using the simple and intuitive web interface of the AWS Management Console. This rule helps S3 bucket policies require encryption during data transit.
Enforcing SSL-only access by denying all regular, unencrypted HTTP requests to your buckets when dealing with sensitive or private data. Because when S3 buckets are not configured to strictly require SSL connections, the communication between the clients (users, applications) and these buckets is vulnerable to eavesdropping and man-in-the-middle (MITM) attacks.
A bucket policy is a resource-based AWS Identity and Access Management (IAM) policy. You add a bucket policy to a bucket to grant other AWS accounts or IAM users access permissions for the bucket and the objects in it. Object permissions apply only to the objects that the bucket owner creates.
By default, Amazon S3 allows both HTTP and HTTPS requests. To comply with the s3-bucket-SSL-requests-only rule, confirm that your bucket policies explicitly deny access to HTTP requests. Bucket policies that allow HTTPS requests without explicitly denying HTTP requests might not comply with the rule.
To verify if your Amazon S3 buckets are protecting data in transit using SSL
Step 1: Sign in to the AWS Management Console and open the Amazon S3 console at https://console.aws.amazon.com/s3/.
Step 2: In the Bucket name list, choose the name of the bucket that you want to create a bucket policy for or whose bucket policy you want to edit.
Step 3: Choose Permissions, and then go to the Bucket Policy section.
Step 4: Click on the Edit button to edit the bucket policy in use or add a new policy.
step 5: In the Bucket Policy Editor dialog box, perform one of the following actions based on your current configuration:
Step 6: Click on Save changes.
If you want to remove or delete the bucket policy then follow the below steps