S3 bucket ACL allows any external actor to write objects to it
- 24 Aug 2023
- 1 Minute to read
- DarkLight
S3 bucket ACL allows any external actor to write objects to it
- Updated on 24 Aug 2023
- 1 Minute to read
- DarkLight
Article summary
Did you find this summary helpful?
Thank you for your feedback
Description
A S3 bucket ACL contains risky settings that allow any user to write to it. Numerous cloud-based data breaches were the result of exposing sensitive data inside object storage like an S3 bucket. Attackers scan exposed S3 buckets for misconfigurations, which can lead to a compromise or a breach of your organization’s data.
Remediation
Audit the bucket ACL for risky permissions such as WRITE
, WRITE_ACP
, or FULL_CONTROL
.