AWS-S3-S3-Bucket-All-Users-ACL
Severity : Critical
Description: This control ensures that S3 buckets access control list does not allow unrestricted public to read or write access. Exposing S3 buckets to everyone or any authenticated AWS users can lead to data leaks, data loss and unexpected charges for the S3 service. S3 buckets can be configured to allow anyone to write objects to a bucket or delete objects. It is recommended this option should not be configured unless there is a strong business requirement. Disable global all users policies on all S3 buckets and ensure both the bucket ACL is configured with least privileges to ensure that you are not accidentally making objects available to users that you don't intend.
Remediation Steps:
Perform following to update S3 bucket access policy :
Login to the AWS Management Console at https://console.aws.amazon.com.
Navigate to s3Â console.
In the navigation pane,  select buckets.
Click on the bucket to be modified, click Permissions.
In the permissions pane, navigate to Access control list (ACL) section.
Click on the Edit.
On the Access control list (ACL) page, in section Everyone (public access), uncheck permission granted to List and Read. If AWS users group, AllUsers, have permission selected, uncheck the boxes.
Click Save Changes.
Important:
Reference:
Blue Hexagon Proprietary