|
1 | 1 | { |
2 | 2 | "Provider": "aws", |
3 | 3 | "CheckID": "glacier_vaults_policy_public_access", |
4 | | - "CheckTitle": "Check if S3 Glacier vaults have policies which allow access to everyone.", |
5 | | - "CheckType": [], |
| 4 | + "CheckTitle": "S3 Glacier vault has no policy or its policy does not allow access to everyone", |
| 5 | + "CheckType": [ |
| 6 | + "Software and Configuration Checks/AWS Security Best Practices", |
| 7 | + "Software and Configuration Checks/Industry and Regulatory Standards/AWS Foundational Security Best Practices", |
| 8 | + "Effects/Data Exposure", |
| 9 | + "TTPs/Initial Access/Unauthorized Access" |
| 10 | + ], |
6 | 11 | "ServiceName": "glacier", |
7 | 12 | "SubServiceName": "", |
8 | | - "ResourceIdTemplate": "arn:aws:glacier:region:account-id:vaults/vault-name", |
| 13 | + "ResourceIdTemplate": "", |
9 | 14 | "Severity": "critical", |
10 | 15 | "ResourceType": "Other", |
11 | | - "Description": "Ensure CodeArtifact internal packages do not allow external public source publishing.", |
12 | | - "Risk": "Vaults accessible to everyone could expose sensitive data to bad actors.", |
13 | | - "RelatedUrl": "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html", |
| 16 | + "Description": "**Glacier vault** access policy is evaluated for exposure to **public principals**. The finding highlights `Allow` statements that grant access to `Principal: '*'` (including wildcard forms), and notes when a vault lacks a policy.", |
| 17 | + "Risk": "Publicly grantable vault access undermines **confidentiality** and **integrity**. Anyone could list, retrieve, or delete archives, leading to data exposure or loss. Attackers may also trigger large retrieval operations, degrading **availability** and driving unexpected costs.", |
| 18 | + "RelatedUrl": "", |
| 19 | + "AdditionalURLs": [ |
| 20 | + "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html", |
| 21 | + "https://docs.prowler.com/checks/aws/general-policies/ensure-glacier-vault-access-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform" |
| 22 | + ], |
14 | 23 | "Remediation": { |
15 | 24 | "Code": { |
16 | | - "CLI": "", |
17 | | - "NativeIaC": "", |
18 | | - "Other": "", |
19 | | - "Terraform": "https://docs.prowler.com/checks/aws/general-policies/ensure-glacier-vault-access-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform" |
| 25 | + "CLI": "aws glacier delete-vault-access-policy --account-id <ACCOUNT_ID> --vault-name <VAULT_NAME>", |
| 26 | + "NativeIaC": "```yaml\n# CloudFormation: Glacier vault without an access policy (no public access)\nResources:\n <example_resource_name>:\n Type: AWS::Glacier::Vault\n Properties:\n VaultName: <example_resource_name>\n # AccessPolicy omitted to remove any public access and pass the check\n```", |
| 27 | + "Other": "1. In AWS Console, open Amazon S3 Glacier (Classic)\n2. Go to Vaults and select the target vault\n3. Open the Access policy tab and click Edit\n4. Remove the policy (clear all content) or delete it\n5. Save changes", |
| 28 | + "Terraform": "```hcl\n# Glacier vault with no access policy (not public)\nresource \"aws_glacier_vault\" \"<example_resource_name>\" {\n name = \"<example_resource_name>\"\n # access_policy omitted to remove any public access and pass the check\n}\n```" |
20 | 29 | }, |
21 | 30 | "Recommendation": { |
22 | | - "Text": "Ensure vault policy does not have principle as *.", |
23 | | - "Url": "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html" |
| 31 | + "Text": "Enforce **least privilege** on vault policies: restrict to specific AWS accounts or roles, avoid `Principal: '*'`, and grant only necessary actions. Apply **defense in depth** with **Vault Lock** for immutable retention and continuous review and monitoring of access to prevent broad or unintended exposure.", |
| 32 | + "Url": "https://hub.prowler.com/check/glacier_vaults_policy_public_access" |
24 | 33 | } |
25 | 34 | }, |
26 | 35 | "Categories": [ |
|
0 commit comments