-
Notifications
You must be signed in to change notification settings - Fork 7
Update cfngoat.yaml #68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -585,7 +585,17 @@ Resources: | |||||||||||||||||||||||||||||||||||||
| ############ | ||||||||||||||||||||||||||||||||||||||
| ### S3 ### | ||||||||||||||||||||||||||||||||||||||
| ############ | ||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||
| DataBucket2: | ||||||||||||||||||||||||||||||||||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||||||||||||||||||||||||||||||
| # Public, not encrypted, no access logs, no versioning | ||||||||||||||||||||||||||||||||||||||
| Type: AWS::S3::Bucket | ||||||||||||||||||||||||||||||||||||||
| DeletionPolicy: Delete | ||||||||||||||||||||||||||||||||||||||
| Properties: | ||||||||||||||||||||||||||||||||||||||
| BucketName: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | ||||||||||||||||||||||||||||||||||||||
| AccessControl: PublicRead | ||||||||||||||||||||||||||||||||||||||
| Tags: | ||||||||||||||||||||||||||||||||||||||
| - Key: Name | ||||||||||||||||||||||||||||||||||||||
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | ||||||||||||||||||||||||||||||||||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||||||||||||||||||||||||||||||
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| BucketEncryption: | |
| ServerSideEncryptionConfiguration: | |
| - ServerSideEncryptionByDefault: | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" |
Ensure data stored in the S3 bucket is securely encrypted at rest
Resource: AWS::S3::Bucket.DataBucket2 | ID: BC_AWS_S3_14
Description
SSE helps prevent unauthorized access to S3 buckets. Encrypting and decrypting data at the S3 bucket level is transparent to users when accessing data.Benchmarks
- PCI-DSS V3.2 3
- NIST-800-53 AC-17, SC-2
- PCI-DSS V3.2.1 3.4
- FEDRAMP (MODERATE) SC-28
- CIS AWS V1.3 2.1.1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| PublicAccessBlockConfiguration: | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" |
Ensure S3 bucket has block public ACLS enabled
Resource: AWS::S3::Bucket.DataBucket2 | ID: BC_AWS_S3_19
Description
Amazon S3 buckets and objects are configured to be private. They are protected by default, with the option to use Access Control Lists (ACLs) and bucket policies to grant access to other AWS accounts and to anonymous public requests. The **Block public access to buckets and objects granted through new access control lists (ACLs)** option does not allow the use of new public bucket or object ACLs, ensuring future PUT requests that include them will fail.This setting helps protect against future attempts to use ACLs to make buckets or objects public. When an application tries to upload an object with a public ACL this setting will be blocked for public access.
We recommend you set S3 Bucket BlockPublicAcls to True.
Benchmarks
- CIS AWS V1.3 1.20
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" | |
| PublicAccessBlockConfiguration: | |
| Value: !Sub "${AWS::AccountId}-${CompanyName}-${Environment}-data2" |
Ensure S3 bucket IgnorePublicAcls is set to True
Resource: AWS::S3::Bucket.DataBucket2 | ID: BC_AWS_S3_21
Description
The IgnorePublicAcls setting causes S3 to ignore all public ACLs on a bucket and any objects that it contains. Enabling this setting does not affect the persistence of any existing ACLs and does not prevent new public ACLs from being set.This setting will block public access granted by ACLs while still allowing PUT Object calls that include a public ACL.
Uh oh!
There was an error while loading. Please reload this page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Resource: AWS::S3::Bucket.DataBucket2 | ID:
BC_AWS_S3_22Description
The S3 Block Public Access configuration enables specifying whether S3 should restrict public bucket policies for buckets in this account. Setting RestrictPublicBucket to TRUE restricts access to buckets with public policies to only AWS services and authorized users within this account.Enabling this setting does not affect previously stored bucket policies. Public and cross-account access within any public bucket policy, including non-public delegation to specific accounts, is blocked.