Amazon_S3_21
If S3 buckets are not configured to strictly require SSL connections, the communication between the clients and these buckets is vulnerable to eavesdropping and man-in-the-middle (MITM) attacks. So avoid from this use SSL-only access by denying all regular, unencrypted HTTP requests to your buckets when dealing with sensitive or private data.
{ "Version": "2012-10-17", "Id": "S3SecureTransportPolicy", "Statement": [ { "Sid": "ForceSSLOnlyAccess", "Effect": "Deny", "Principal": { "AWS": "*" }, "Action": "s3:*", "Condition": { "Bool": { "aws:SecureTransport": false } }, "Resource":"arn:aws:s3:::abc-bucket-name/*" } ]}
{ "Sid": "ForceSSLOnlyAccess", "Effect": "Deny", "Principal": { "AWS": "*" }, "Action": "s3:*", "Condition": { "Bool": { "aws:SecureTransport": false } }, "Resource":"arn:aws:s3:::abc-bucket-name/*" }
Want to Know More?
Learn how our partners are managing their cloud security and compliance with Cloudlytics.
I hereby accept the GDPR and Privacy Policy, by subscribing to the newsletters.