Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remediation guide for plugin S3 Glacier Vault Public Access #2

Merged
merged 1 commit into from
Nov 1, 2022
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 25 additions & 0 deletions en/aws/glacier/S3-glacier-vault-public-access.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com)

# AWS / Glacier / S3 Glacier Vault Public Access

## Quick Info

| | |
|-|-|
| **Plugin Title** | S3 Glacier Vault Public Access |
| **Cloud** | AWS |
| **Category** | Glacier |
| **Description** | Ensure that S3 Glacier Vault public access block is enabled for the account |
| **More Info** | Blocking S3 Glacier Vault public access at the account level ensures objects are not accidentally exposed |
| **AWS Link** | http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/private-content-restricting-access-to-s3.html |
| **Recommended Action** | Add access policy for the S3 Glacier Vault to block public access for the AWS account |

## Detailed Remediation Steps
1. Log into the AWS Management Console. </br>
2. Select the "Services" option and search for S3 Glacier. </br>
3. On the navigation pane to the left, click on vaults. </br>
4. Click the vault name that you need you need to edit its policy to block public access. </br>
5. Select Vault Policies tab. </br>
6. Click on Edit vault access policy. </br>
7. Edit the policy by removing public access (e.g. "Resource": "*" or "Principal": "*", and "Effect": "Allow") and make sure the policy grant access only to fixed values (values that don't contain a wildcard or an AWS Identity and Access Management Policy Variable). </br>
8. See this resource to understand when a policy considered public: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html#access-control-block-public-access-policy-status </br>