Skip to content

Latest commit

 

History

History
123 lines (120 loc) · 2.92 KB

Sec-PreventPublicBucketACL.md

File metadata and controls

123 lines (120 loc) · 2.92 KB

Prevent Public S3 Buckets

This policy has been somewhat deprecated by the AWS S3 Block Public Access setting. However it can help prevent Public S3 buckets if the Block Public Access Setting isn't available.

It should ideally be applied to the Workloads OU, and a single account dedicated to public S3 Buckets would be in a different OU.

Policy

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "PreventPublicBucketCannedACL",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-acl": [
            "public-read-write",
            "public-read",
            "authenticated-read"
          ]
        }
      }
    },
    {
      "Sid": "PreventPublicBucketACLGrantFullControl",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-grant-full-control": [
            "uri=http://acs.amazonaws.com/groups/global/AllUsers",
            "uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
          ]
        }
      }
    },
    {
      "Sid": "PreventPublicBucketACLGrantRead",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-grant-read": [
            "uri=http://acs.amazonaws.com/groups/global/AllUsers",
            "uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
          ]
        }
      }
    },
    {
      "Sid": "PreventPublicBucketACLGrantReadACP",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-grant-read-acp": [
            "uri=http://acs.amazonaws.com/groups/global/AllUsers",
            "uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
          ]
        }
      }
    },
    {
      "Sid": "PreventPublicBucketACLGrantWrite",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-grant-write": [
            "uri=http://acs.amazonaws.com/groups/global/AllUsers",
            "uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
          ]
        }
      }
    },
    {
      "Sid": "PreventPublicBucketACLGrantWriteACP",
      "Effect": "Deny",
      "Action": [
        "s3:PutBucketAcl"
      ],
      "Resource": [
        "*"
      ],
      "Condition": {
        "StringEquals": {
          "s3:x-amz-grant-write-acp": [
            "uri=http://acs.amazonaws.com/groups/global/AllUsers",
            "uri=http://acs.amazonaws.com/groups/global/AuthenticatedUsers"
          ]
        }
      }
    }
  ]
}