Skip to main content

A CloudTrail bucket has public read Access Control List which can lead to private data exposure

SeverityExploitabilityProvidersCategories
CRITICALHIGHAWSDATA

Description

Cloudtrail logs record every action taken by a user, role or AWS service in the account as events. The bucket where the logs are stored is set with "public-read" ACLs. This means that its content can be publicly read without authentication.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
TrueTrueFalseFalse
  • Data Exposure

Remediation guidelines

Disable public access to the bucket storing the logs. For example, use the "private" preset ACL in the bucket's configuration.

References

How can I help you ?