- Newest
- Most votes
- Most comments
The reason why it's done is because it's AWS best practice to enable logging on all S3 buckets. However, the logging bucket is, and should be, the one exception to that rule for the reasons you've pointed out. It therefore means that a customer should implement other controls to ensure that undesired access or actions cannot be taken against the logging bucket as no actions will be recorded.
At this time, it's a configuration that customers can remove but AWS implements to provide a "secure by default" configuration, even if it may cause a undesired circular pattern which has a detrimental effect on customers. There is a mechanism by which you can request this be updated and addressed by working with your account manager or through a support ticket.
Relevant content
- asked 2 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 4 months ago
- AWS OFFICIALUpdated a month ago
- AWS OFFICIALUpdated 4 months ago
For anyone running into this now. The issue raised here have been addressed. Please check out - https://aws.amazon.com/about-aws/whats-new/2023/02/aws-control-tower-logging-exceptions-global-services-region-deny/