Ensure that your AWS S3 buckets enforce encryption of data over the network (as it travels to and from Amazon S3) using Secure Sockets Layer (SSL)
This rule can help you with the following compliance standards:
This rule can help you work with the AWS Well-Architected Framework
This rule resolution is part of the Cloud Conformity Security & Compliance tool for AWS
When S3 buckets are not configured to strictly require SSL connections, the communication between the clients (users, applications) and these buckets is vulnerable to eavesdropping and man-in-the-middle (MITM) attacks. Cloud Conformity strongly recommends enforcing SSL-only access by denying all regular, unencrypted HTTP requests to your buckets when dealing with sensitive or private data.
Audit
To determine if your Amazon S3 buckets are protecting data in transit using SSL, perform the following:
Remediation / Resolution
To enforce SSL-only access to your S3 buckets via access policies, perform the following actions:
References
- AWS Documentation
- Amazon Simple Storage Service (S3) FAQs
- Using Bucket Policies and User Policies
- Access Policy Language Overview
- IAM Policy Elements Reference
- Editing Bucket Permissions
- AWS Command Line Interface (CLI) Documentation
- s3api
- list-buckets
- get-bucket-policy
- put-bucket-policy
Unlock the Remediation Steps
Gain free unlimited access
to our full Knowledge Base
Over 750 rules & best practices
for and
Get started for FREE
You are auditing:
Secure Transport
Risk level: Medium