Critical
CloudTrail
Regional
Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible
CISPCI DSS
Description
This control checks whether the S3 bucket used to store CloudTrail logs is publicly accessible.
Remediation
To comply with this control, ensure that the S3 bucket used for storing CloudTrail logs is configured to deny public access. Both the bucket policy and the ACLs should restrict public access.
Steps
- Sign in to the AWS Management Console and open the S3 console.
- In the S3 console, find and select the S3 bucket used by CloudTrail.
- Click on the 'Permissions' tab for the selected bucket.
- Under the 'Block public access (bucket settings)' section, ensure that 'Block all public access' is turned on. This setting should block new public ACLs and any public bucket policies.
- Click on 'Edit' if 'Block all public access' is not enabled and then enable it.
- Scroll down to the 'Bucket policy' section. Ensure that the bucket policy does not allow public access. If necessary, modify the policy to restrict public access.
- Also, under the 'Access control list (ACL)' section, ensure that the bucket is not publicly accessible.
Compliance
CISPCI DSS