More Info:
AWS S3 buckets should not allow WRITE_ACP access to AWS authenticated users using ACLs. Granting authenticated “WRITE_ACP” access to your AWS S3 buckets can allow other AWS accounts or IAM users to edit ACL permissions in order to view, upload, modify and delete S3 objects within the buckets without restrictions.Risk Level
HighAddress
SecurityCompliance Standards
CBP, PCIDSS, NISTTriage and Remediation
Remediation
Using Console
Using Console
To remediate the “S3 Bucket Should Not Allow WRITE_ACP Access to Authenticated Users” misconfiguration in AWS, you can follow these steps using the AWS console:
- Log in to the AWS Management Console.
- Navigate to the S3 service.
- Click on the name of the bucket that you want to remediate.
- Click on the “Permissions” tab.
- Click on the “Access control list (ACL)” button.
- Under the “Grantee” column, find the row that has “Authenticated Users”.
- In the “Permission” column, find the “WRITE_ACP” permission.
- Click on the “x” button to remove the “WRITE_ACP” permission for “Authenticated Users”.
- Click on the “Save” button to save the changes.
- Verify that the “Authenticated Users” group no longer has the “WRITE_ACP” permission by checking the “Access control list (ACL)” again.
- Repeat these steps for any other S3 buckets that have the same misconfiguration.
Using CLI
Using CLI
To remediate the misconfiguration “S3 Bucket Should Not Allow WRITE_ACP Access to Authenticated Users” for AWS using AWS CLI, follow these steps:
- Open the AWS CLI on your local machine.
-
Run the following command to get a list of all S3 buckets in your AWS account:
- Identify the S3 bucket that has WRITE_ACP access granted to authenticated users.
-
Run the following command to revoke WRITE_ACP access for authenticated users:
Replace “bucket-name” with the name of the S3 bucket that you want to remediate.
-
Verify that WRITE_ACP access for authenticated users has been revoked by running the following command:
Replace “bucket-name” with the name of the S3 bucket that you want to remediate.
- Repeat the above steps for all S3 buckets that have WRITE_ACP access granted to authenticated users.
Using Python
Using Python
To remediate the misconfiguration of allowing WRITE_ACP access to authenticated users in an AWS S3 bucket using Python, follow these steps:This code will remove the statement that allows WRITE_ACP access to authenticated users from the S3 bucket policy.
- Create an AWS S3 client using the AWS SDK for Python (Boto3).
- Get the bucket policy using the
get_bucket_policy()
method of the S3 client. - Parse the JSON policy to identify the statement that allows WRITE_ACP access to authenticated users.
- Remove the identified statement from the policy.
- Update the bucket policy using the
put_bucket_policy()
method of the S3 client.