SCP to enable "Block S3 Public Access"

0

Dear Team - Can anyone help me on best way to implement SCP to block the S3 public read access. It should not impact the existing one and only deny when someone trying to create the new bucket and add Policy/ACL for public access. I tried below but still users are able to create new bucket and can apply s3 policy for public read access.

{ "Version": "2012-10-17", "Statement": [ { "Action": [ "s3:PutAccountPublicAccessBlock" ], "Resource": "*", "Effect": "Deny" } ] }

2 回答
0
已接受的回答

Hi, this SCP works for me: (you need an additional s3:PutBucketPublicAccessBlock)

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Action": [
        "s3:PutBucketPublicAccessBlock",
        "s3:PutAccountPublicAccessBlock"
      ],
      "Resource": "*",
      "Effect": "Deny"
    }
  ]
}

Also note that SCP doesn't apply to the Organization's management account. You can only restrict bucket public access for member accounts.

profile picture
HS
已回答 7 个月前
  • Just to confirm, this will not impact the existing public accessible S3 bucket and only apply to new bucket, right ?

0

Just to confirm, this will not impact the existing public accessible S3 bucket and only apply to new bucket, right ?

Right. It will not affect the existing bucket.

In my case, 229660767790-public and 229660767790-private are existing buckets before the SCP was applied, and 229660767790-public2 is the new bucket after the SCP was applied.

I failed to make 229660767790-public2 public, but 229660767790-public is still public.

Enter image description here

Nevertheless, you should test this policy yourself before applying to the production.

profile picture
HS
已回答 7 个月前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则