More Info:

Ensure AWS S3 CNAME records are not vulnerable

Risk Level

High

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the vulnerability of AWS S3 CNAME Records, you can follow the steps below using the AWS Management Console:

  1. Sign in to the AWS Management Console and open the Route 53 service.
  2. In the Route 53 dashboard, click on “Hosted zones” in the left sidebar.
  3. Select the hosted zone that contains the misconfigured CNAME record.
  4. In the hosted zone details, locate the CNAME record that points to the S3 bucket.
  5. Click on the checkbox next to the CNAME record to select it.
  6. Click on the “Actions” button above the record list and select “Edit record set” from the dropdown menu.
  7. In the “Edit record set” dialog box, you will see the CNAME record details.
  8. Change the value of the “Alias” field to “No” to remove the CNAME alias.
  9. In the “Value” field, enter the actual endpoint or domain name of the S3 bucket that the CNAME record was pointing to.
  10. Click on the “Save Record Set” button to save the changes.

By following these steps, you have successfully remediated the vulnerability of AWS S3 CNAME Records in Route 53 using the AWS Management Console.