More Info:

AWS SES identities (domains and/or email addresses) should not allow unknown cross-account access via authorization policies. Your SES identities should be configured to allow access only to trusted (friendly) AWS accounts in order to prevent unauthorized users from sending emails on your behalf.

Risk Level

Medium

Address

Security

Compliance Standards

CBP

Triage and Remediation

Remediation

To remediate the issue of SES Identities allowing cross-account access in AWS using the AWS Management Console, follow these steps:

  1. Sign in to the AWS Management Console: Go to the AWS Management Console and sign in using your credentials.

  2. Navigate to the SES Console: In the AWS Management Console, search for “SES” in the services search bar and click on “Simple Email Service” to open the SES console.

  3. Select the SES Identity: In the SES console, select the SES identity (email address, domain, or email sending authorization) that you want to remediate for cross-account access.

  4. Check the Identity Policies: Under the “Identity Policies” section, review the policies associated with the selected SES identity to identify any cross-account access permissions.

  5. Remove Cross-Account Access Permissions: To remove cross-account access permissions from the identity policy, follow these steps:

    • Click on the “Edit Policy” button next to the policy that allows cross-account access.
    • In the policy editor, locate the statement that grants cross-account access and delete or modify it accordingly.
    • Ensure that the policy only allows necessary permissions for the SES identity without granting access to other AWS accounts.
  6. Save the Policy Changes: After removing the cross-account access permissions from the identity policy, click on the “Save Changes” or “Update Policy” button to save the updated policy.

  7. Verify the Changes: Verify that the identity policy no longer allows cross-account access by reviewing the updated policy in the SES console.

By following these steps, you can remediate the issue of SES identities allowing cross-account access in AWS SES using the AWS Management Console.

Additional Reading: