AWS-IAM-Unexpected-S3-Listing-Principal
Severity : Critical
Description : The ability to list s3 buckets, and get objects from them, should be restricted largely to people as compromising an EC2 with this privilege could lead to exfiltration of data.
Description: This control ensures that  s3 buckets policy doesn’t allows listing operation by anonymous or unauthorized IAM Users. The ability to list s3 buckets, and get objects from them, should be restricted largely to people as compromising an EC2 with this privilege could lead to exfiltration of data.
Remediation Steps:
Perform following to update IAM policy for IAM user :
Login to the AWS Management Console at https://console.aws.amazon.com.
Navigate to S3Â console.
In the navigation pane, choose buckets.
From the list of buckets, select the reported bucket.
In the Permission tab, Click on the Bucket Policy.
Update the S3 bucket policy, by removing Principal containing wildcard(*) to specific accounts.
If Listing Action have principal update them by removing Principal containing wildcard(*) to specific accounts.
Update the Action to specific actions , instead of wild card.
Important:
Reference:
Blue Hexagon Proprietary