Profile Applicability:
- Level 2
Description:
Amazon S3 (Simple Storage Service) is a scalable storage solution for storing data in the cloud. S3 bucket permissions allow users to control who can access and list the objects in the bucket. If an S3 bucket is configured to allow public listing of its contents, it can expose sensitive data to anyone on the internet or any AWS customer, which can result in data leaks, compliance violations, and security risks. It is crucial to ensure that S3 buckets are not listable by Everyone or Any AWS customer.
Rationale:
Allowing anyone (including unauthorized AWS customers) to list the contents of an S3 bucket poses a significant security risk. This can lead to the unintentional exposure of sensitive data, intellectual property, or personal information. By preventing public listing of S3 buckets, you safeguard your data from being easily discovered or accessed by unauthorized parties. This helps in compliance with data privacy regulations such as GDPR, HIPAA, and SOC 2.
Impact:
Pros:
Prevents unauthorized users or AWS customers from viewing the contents of S3 buckets.
Reduces the risk of data exposure or misuse.
Enhances security and privacy by restricting public listing permissions.
Helps maintain compliance with industry standards and security best practices.
Cons:
Requires regular auditing of S3 bucket permissions.
Might cause issues if public access is needed for specific objects or buckets.
Default Value:
By default, new S3 buckets are not listable by the public or any AWS customer. However, bucket policies or IAM permissions may allow public listing, which should be reviewed and restricted.
Pre-requisites:
AWS IAM permissions:
s3:ListBucket
s3:GetBucketAclAccess to the S3 bucket configurations for reviewing permissions and access control lists (ACLs).
Ability to modify bucket policies to restrict access.
Remediation:
Test Plan:
Using AWS Console:
Sign in to the AWS Management Console.
Navigate to S3 and select Buckets from the left-hand menu.
For each bucket, click on the bucket name to open its configuration.
Under the Permissions tab, review the Bucket Policy and Access Control List (ACL).
Ensure that there are no statements in the Bucket Policy allowing public access to list objects (s3:ListBucket) or objects to be read by Everyone or Any AWS customer.
Review the Bucket ACL to ensure that the Everyone and Any AWS customer permissions are restricted.
If public listing is enabled, modify the Bucket Policy or ACL to ensure that only authorized users or accounts have access to list the bucket's contents.
For stricter access control, use IAM policies to restrict permissions at the user or role level.
Using AWS CLI:
List all S3 buckets:
aws s3api list-buckets --query "Buckets[*].Name"
For each bucket, check the bucket’s permissions:
aws s3api get-bucket-policy --bucket <BUCKET_NAME>
Check if any policy allows Everyone (Principal: "*") or Any AWS Customer (Principal: "AWS") to list the bucket.
To check the bucket’s ACL, run:
aws s3api get-bucket-acl --bucket <BUCKET_NAME>
Ensure that Everyone does not have READ or LIST permissions.
If public listing is enabled, disable it by updating the Bucket Policy or ACL:
To modify the Bucket Policy to deny public listing, use the following policy:
{ "Version": "2012-10-17", "Statement": [ { "Effect": "Deny", "Principal": "*", "Action": "s3:ListBucket", "Resource": "arn:aws:s3:::<BUCKET_NAME>" } ] }
Update the bucket policy:
aws s3api put-bucket-policy --bucket <BUCKET_NAME> --policy file://policy.json
To modify the Bucket ACL to remove Everyone or Any AWS customer access, run:
aws s3api put-bucket-acl --bucket <BUCKET_NAME> --acl private
Implementation Plan:
Using AWS Console:
Open the S3 Console and review each bucket’s permissions under the Permissions tab.
Ensure that the Bucket Policy does not allow public listing and remove any Everyone or Any AWS customer access.
If public access is found, modify the policy to restrict access.
Use the ACL settings to ensure only authorized users or services can access the bucket.
Using AWS CLI:
For each bucket, check the current Bucket Policy and ACL.
Update the Bucket Policy to restrict public listing permissions.
Use the put-bucket-acl command to modify the ACL and remove public access:
aws s3api put-bucket-acl --bucket <BUCKET_NAME> --acl private
Verify that public listing is disabled by checking the permissions again.
Backout Plan:
Using AWS Console:
If modifications cause issues, sign in to the AWS Management Console.
Navigate to Amazon S3, select the bucket, and go to the Permissions tab.
Revert the Bucket Policy and ACL to the previous settings before restrictions were applied.
Save the changes and monitor the bucket to ensure it is functioning as expected.
Using AWS CLI:
If you need to revert changes, restore the Bucket Policy and ACL to the previous settings:
aws s3api put-bucket-policy --bucket <BUCKET_NAME> --policy file://previous-policy.json aws s3api put-bucket-acl --bucket <BUCKET_NAME> --acl private
Reference:
CIS Controls: