More Info:

Ensure that cloud Storage bucket Logs are not Publicly Accessible by setting “publicAccessPrevention” to “enforced”.

Risk Level

High

Address

Security

Compliance Standards

HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

Sure, I can help you with that. Here are the step by step instructions to remediate the issue “Storage Bucket Logs Should Not be Publicly Accessible” for GCP using GCP Console:

  1. Open the GCP Console and navigate to the Cloud Storage page.

  2. Select the bucket that you want to remediate.

  3. Click on the “Permissions” tab.

  4. Under the “Public access prevention” section, click on the “Edit” button.

  5. Set the “Prevent public access” toggle to “On”.

  6. Click on the “Save” button to save the changes.

  7. Under the “Access control” section, click on the “Add members” button.

  8. Enter the email address of the user or service account that you want to grant access to.

  9. Select the appropriate role from the “Select a role” dropdown menu.

  10. Click on the “Add” button to add the member and role.

  11. Repeat steps 7-10 for each user or service account that you want to grant access to.

  12. Click on the “Save” button to save the changes.

By following these steps, you have successfully remediated the issue “Storage Bucket Logs Should Not be Publicly Accessible” for GCP using GCP Console.