S3 permissions granted to other AWS accounts in bucket policies should be restricted

0

Can anyone please help how to fix this security alert " S3 permissions granted to other AWS accounts in bucket policies should be restricted " Step by Step procedure to fix.

I tired the below AWS remediation steps , I am struck on 5 & 6 which I have marked **

Open the Amazon S3 console at https://console.aws.amazon.com/s3/. In the Bucket name list, choose the name of the S3 bucket for which you want to edit the policy. Choose Permissions, and then choose Bucket Policy. In the Bucket policy editor text box, do one of the following: Remove the statements that grant access to denied actions to other AWS accounts Remove the permitted denied actions from the statements Choose Save.

Thanks

질문됨 2년 전1043회 조회
2개 답변
1

in AWS Management Account (also called root account) - you can leverage Service Control Policies (SCPs) to add a policy that meets a specific compliance policy.

Use this link to find out exactly how to create a specific SCP and apply to your organization : https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_scps.html

profile picture
답변함 2년 전
0

Yes, i gone through SCP but Sorry i am still confused what to do ?

답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠