Aws Private Buckets Not Blocking Acls
Description
Detects S3 buckets that are configured as private but do not have public access blocking settings enabled. This is a security risk since these buckets could be accidentally made public through bucket ACLs or policies, even if they are currently private. Having block public access settings disabled removes an important security safeguard.
Detection Strategy
• Identifies all S3 buckets in the AWS account
• For each private bucket (skips already public buckets), checks if the Public Access Block configuration exists
• Reports a vulnerability if the Public Access Block configuration is missing entirely
• Reports a vulnerability for each public access block setting (BlockPublicAcls, BlockPublicPolicy, IgnorePublicAcls, RestrictPublicBuckets) that is set to false
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.