Using AWS Config to Detect Public Bucket

Using AWS Config to Detect Public Bucket

  1. Go to AWS Management Console

    • Find AWS Config
    • Select AWS Config

AWS Config

  1. In the AWS Config interface

    • Select Rules
    • Select Add rules

AWS Config

  1. Choose a rule type

    • Select Add AWS managed rule

AWS Config

  1. For AWS Managed Rules

    • Find s3-bucket-public-read-prohibited
    • Select s3-bucket-public-read-prohibited
    • Select Next

AWS Config

  1. Select Next

AWS Config

  1. Check again and select Add rule

AWS Config

  1. The rule has been added successfully. AWS Config

  2. Go to AWS Config interface and select Dashboard

AWS Config

  1. Return to S3 bucket interface

    • Select sid-security-xxx bucket.

AWS Config

  1. In the bucket interface select Permissions

AWS Config

  1. For Access control list (ACL), select Edit

AWS Config

  1. In the ACL editing interface

    • For Everyone (public access), select List and Read

AWS Config

  1. Select I understand the effects…* and select Save changes

AWS Config

  1. Now we will see Permissions in state Public (Public Bucket)

AWS Config

  1. Return to Config interface

    • Select Rules
    • Select s3-bucket-public-read-prohibited
    • Observation Resource in scope is currently not available.

AWS Config

  1. In the same interface, select Actions

    • Select Re-evaluate

AWS Config

  1. Observe the Resource in scope section appears resource.

AWS Config