More Info:

AWS S3 buckets should not allow public READ_ACP access. Granting public “READ_ACP” access to your S3 buckets can allow everyone on the Internet to see who controls your objects. Malicious users can use this information to find S3 objects with misconfigured permissions and implement probing techniques to help them gain access to your S3 data.

Risk Level

Medium

Address

Security

Compliance Standards

PCIDSS, NIST

Triage and Remediation

Remediation

Sure, here are the step by step instructions to remediate the misconfiguration “S3 Bucket Should Not Allow Public READ_ACP Access” for AWS using AWS console:

  1. Log in to your AWS console.
  2. Navigate to the S3 service.
  3. Select the S3 bucket that you want to remediate.
  4. Click on the “Permissions” tab.
  5. Scroll down to the “Access control list (ACL)” section.
  6. Click on the “Edit” button next to the “Public access” option.
  7. Uncheck the “List objects” checkbox under the “Access for Everyone” section.
  8. Click on the “Save” button to save the changes.

By following the above steps, you have successfully remediated the misconfiguration “S3 Bucket Should Not Allow Public READ_ACP Access” for AWS using AWS console.

Additional Reading: