Ensure that your Amazon S3 buckets are configured to allow access only to specific (trusted) IP addresses in order to protect against unauthorized access. Prior to running this rule by the Trend Cloud One™ – Conformity engine, you have to provide the list of IPv4 addresses that are allowed to access your Amazon S3 buckets.
Allowing untrustworthy access to your Amazon S3 buckets can lead to unauthorized actions such as viewing, uploading, modifying, or deleting S3 objects. To prevent S3 data exposure, data loss, unexpected charges on your AWS bill or you just want a central place to manage bucket access using bucket policies, you must ensure that your S3 buckets are accessible only to a short list of trusted IPs.
Because S3 bucket policies are limited to 20 KB in size, you must configure the conformity rule with a short list of trusted IP addresses.
Audit
To determine if the access to your Amazon S3 buckets is restricted to specific IP addresses via bucket policies, perform the following actions:
Remediation / Resolution
To update the bucket policies attached to your Amazon S3 buckets in order to grant access to trusted IP addresses only, perform the following actions:
As an example, this rule section demonstrates how to grant permissions to specific (trusted) IPs to perform any S3 operations on objects within the selected bucket.References
- AWS Documentation
- Amazon S3 FAQs
- Logging requests using server access logging
- Access control list (ACL) overview
- AWS Command Line Interface (CLI) Documentation
- s3api
- list-buckets
- get-bucket-policy
- put-bucket-policy
- CloudFormation Documentation
- Amazon Simple Storage Service resource type reference
- Terraform Documentation
- AWS Provider