S3 bucket ACL allows any external actor to write objects to it
    • 24 Aug 2023
    • 1 Minute to read
    • Dark
      Light

    S3 bucket ACL allows any external actor to write objects to it

    • Dark
      Light

    Article summary

    Description

    A S3 bucket ACL contains risky settings that allow any user to write to it. Numerous cloud-based data breaches were the result of exposing sensitive data inside object storage like an S3 bucket. Attackers scan exposed S3 buckets for misconfigurations, which can lead to a compromise or a breach of your organization’s data.

    Remediation

    Audit the bucket ACL for risky permissions such as WRITE, WRITE_ACP, or FULL_CONTROL.