Skip to content

Latest commit

 

History

History
32 lines (28 loc) · 3.26 KB

cloudtrail-bucket-private.md

File metadata and controls

32 lines (28 loc) · 3.26 KB

CloudSploit

AWS / CloudTrail / CloudTrail Bucket Private

Quick Info

Plugin Title CloudTrail Bucket Private
Cloud AWS
Category CloudTrail
Description Ensures CloudTrail logging bucket is not publicly accessible
More Info CloudTrail buckets contain large amounts of sensitive account data and should only be accessible by logged in users.
AWS Link http://docs.aws.amazon.com/AmazonS3/latest/dev/example-bucket-policies.html
Recommended Action Set the S3 bucket access policy for all CloudTrail buckets to only allow known users to access its files.

Detailed Remediation Steps

  1. Log in to the AWS Management Console.
  2. Select the "Services" option and search for "CloudTrail".
  3. In the "Dashboard" panel click on the desired trail from the list under "Trails" to get to its configuration page.
  4. Click on "Edit" under "General details".
  5. Scroll down and under the "Storage location" option check the S3 bucket name which stores the log data.
  6. Go to "Services" and search for "S3" to go into S3 buckets dashboard.
  7. Select the "S3 bucket" which is used to store data log in CloudTrail and check the "Access" option. If "Access" shows "Objects can be public" than bucket is publicly accessible
  8. Click on the Bucket name to get into its configuration page.
  9. Click on the "Permissions" tab and scroll down to "Block public access (bucket settings)" and click "Edit".
  10. Select the checkbox "Block all public access" shown under "Block public access (bucket settings)" to make the S3 bucket private.
  11. Click on "save changes" to save the settings.
  12. On the permissions tab scroll down to "Access control list (ACL)" to check the access for other AWS accounts on the selected S3 bucket for known users. Click "Edit" to add permissions for accounts as desired.
  13. On the "Edit access control list (ACL)" page click on "Add grantee" button to grant access to other AWS accounts as desired.
  14. Under "Access for other AWS accounts" paste the Canonical ID of the desired AWS account and check desired permissions. Review and click "Save changes".
  15. Repeat steps 4 to 14 for all other Cloudtrail trails.