- Newest
- Most votes
- Most comments
At a minimum,
- Check the S3 bucket policy, see if access is restricted.
- Create a new IAM role that has permissions to read /write to S3.
- Update your EC2 instance, to use the IAM role instead of the access key.
If you are not running it from EC2, but from an op-premises or non-AWS resource, you can create an IAM user with the same permissions, provision access keys and use the access keys for the read write to S3.
Given your situation as the company owner with limited AWS expertise, here's a simplified approach to address your access control issues:
-
Revoking access of unwanted user
- Log into the AWS Management Console using your root account.
- Go to IAM and search for the IAM user with unwanted access.
- Delete this user and any unwanted role.
-
Engage an AWS expert:
- Consider hiring an AWS certified consultant or engaging AWS Professional Services. You can also reach out to us via an AWS Support case : https://aws.amazon.com/premiumsupport/
- Once a case is created, The support team can perform an overview of your current setup and help you implement the necessary changes safely.
-
Implement immediate security measures:
- Enable multi-factor authentication (MFA) for your root account and all IAM users.
- Change the password for your root account and any known IAM users.
-
Gradually implement changes:
- Work with the AWS expert to create new IAM roles with the minimum necessary permissions.
- Test these roles in the staging environment before applying to production.
- Gradually transition from the old setup to the new one, ensuring functionality at each step.
-
Implement ongoing security practices:
- Set up AWS CloudTrail for monitoring API activity.
- Configure AWS Config rules to monitor for policy changes.
- Schedule regular security audits of your AWS environment.
Remember, the key is to proceed cautiously and methodically. Don't rush to make changes without understanding their impact. Working with an AWS expert will help ensure a smooth transition while maintaining your system's functionality and improving its security.
References :
Here is a guide which advises on how to deal with unauthorized access : https://repost.aws/knowledge-center/potential-account-compromise