More Info:

AWS S3 buckets should not be granting FULL_CONTROL access to authenticated users (i.e. signed AWS accounts or AWS IAM users) in order to prevent unauthorized access. Exposing your S3 buckets to AWS signed accounts or users can lead to data leaks, data loss and unexpected charges for the S3 service.

Risk Level

High

Address

Security

Compliance Standards

CBP, AWSWAF, PCIDSS, NIST

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the issue of an S3 Bucket allowing FULL_CONTROL access to Authenticated Users in AWS using the AWS console:

  1. Login to your AWS account and go to the S3 console.
  2. Select the bucket for which you want to remediate the issue.
  3. Click on the “Permissions” tab in the top navigation bar.
  4. Under the “Access control list (ACL)” section, locate the “Authenticated Users” group and select it.
  5. Click on the “Actions” button and select “Edit bucket policy”.
  6. In the bucket policy editor, remove the “FULL_CONTROL” permission from the “Authenticated Users” group.
  7. Click on the “Save changes” button to save the updated bucket policy.

After following these steps, the S3 bucket will no longer allow FULL_CONTROL access to Authenticated Users.

Additional Reading: