Identify any publicly accessible Amazon SQS queues and update their permissions in order to protect against unauthorized users.
This rule can help you with the following compliance standards:
- PCI
- GDPR
- APRA
- MAS
For further details on compliance standards supported by Conformity, see here.
This rule can help you work with the AWS Well-Architected Framework.
This rule resolution is part of the Conformity Security & Compliance tool for AWS.
Allowing anonymous users to have access to your Amazon SQS queues can lead to unauthorized actions such as intercepting, deleting, and sending compromised queue messages. One common scenario is when the queue owner grants permissions to everyone by setting the Principal to Everybody (i.e. "*") while testing the queue system configuration and the insecure set of permissions reach into production. To avoid data leakage and unexpected costs on your AWS bill, limit access to your SQS queues by implementing the right permissions.
Audit
To determine if your Amazon SQS queues are publicly accessible, perform the following operations:
Remediation / Resolution
To update the custom policies and set the appropriate permissions to secure any exposed SQS queues, perform the following:
References
- AWS Documentation
- Amazon SQS FAQs
- Identity and access management in Amazon SQS
- IAM JSON policy elements reference
- Using custom policies with the Amazon SQS Access Policy Language
- AWS Command Line Interface (CLI) Documentation
- sqs
- list-queues
- get-queue-attributes
- set-queue-attributes
- CloudFormation Documentation
- Amazon Simple Queue Service resource type reference
- Terraform Documentation
- AWS Provider