Skip to content

Commit 6ff559c

Browse files
authored
chore(aws): enhance metadata for glacier service (#9007)
1 parent 899db55 commit 6ff559c

File tree

2 files changed

+23
-12
lines changed

2 files changed

+23
-12
lines changed

prowler/CHANGELOG.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,8 @@ All notable changes to the **Prowler SDK** are documented in this file.
7171
- Update AWS CloudFront service metadata to new format [(#8829)](https://github.com/prowler-cloud/prowler/pull/8829)
7272
- Deprecate user authentication for M365 provider [(#8865)](https://github.com/prowler-cloud/prowler/pull/8865)
7373
- Update AWS EFS service metadata to new format [(#8889)](https://github.com/prowler-cloud/prowler/pull/8889)
74+
- Update AWS Glacier service metadata to new format [(#9007)](https://github.com/prowler-cloud/prowler/pull/9007)
75+
7476

7577
### Fixed
7678
- Fix SNS topics showing empty AWS_ResourceID in Quick Inventory output [(#8762)](https://github.com/prowler-cloud/prowler/issues/8762)

prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,35 @@
11
{
22
"Provider": "aws",
33
"CheckID": "glacier_vaults_policy_public_access",
4-
"CheckTitle": "Check if S3 Glacier vaults have policies which allow access to everyone.",
5-
"CheckType": [],
4+
"CheckTitle": "S3 Glacier vault has no policy or its policy does not allow access to everyone",
5+
"CheckType": [
6+
"Software and Configuration Checks/AWS Security Best Practices",
7+
"Software and Configuration Checks/Industry and Regulatory Standards/AWS Foundational Security Best Practices",
8+
"Effects/Data Exposure",
9+
"TTPs/Initial Access/Unauthorized Access"
10+
],
611
"ServiceName": "glacier",
712
"SubServiceName": "",
8-
"ResourceIdTemplate": "arn:aws:glacier:region:account-id:vaults/vault-name",
13+
"ResourceIdTemplate": "",
914
"Severity": "critical",
1015
"ResourceType": "Other",
11-
"Description": "Ensure CodeArtifact internal packages do not allow external public source publishing.",
12-
"Risk": "Vaults accessible to everyone could expose sensitive data to bad actors.",
13-
"RelatedUrl": "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html",
16+
"Description": "**Glacier vault** access policy is evaluated for exposure to **public principals**. The finding highlights `Allow` statements that grant access to `Principal: '*'` (including wildcard forms), and notes when a vault lacks a policy.",
17+
"Risk": "Publicly grantable vault access undermines **confidentiality** and **integrity**. Anyone could list, retrieve, or delete archives, leading to data exposure or loss. Attackers may also trigger large retrieval operations, degrading **availability** and driving unexpected costs.",
18+
"RelatedUrl": "",
19+
"AdditionalURLs": [
20+
"https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html",
21+
"https://docs.prowler.com/checks/aws/general-policies/ensure-glacier-vault-access-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform"
22+
],
1423
"Remediation": {
1524
"Code": {
16-
"CLI": "",
17-
"NativeIaC": "",
18-
"Other": "",
19-
"Terraform": "https://docs.prowler.com/checks/aws/general-policies/ensure-glacier-vault-access-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform"
25+
"CLI": "aws glacier delete-vault-access-policy --account-id <ACCOUNT_ID> --vault-name <VAULT_NAME>",
26+
"NativeIaC": "```yaml\n# CloudFormation: Glacier vault without an access policy (no public access)\nResources:\n <example_resource_name>:\n Type: AWS::Glacier::Vault\n Properties:\n VaultName: <example_resource_name>\n # AccessPolicy omitted to remove any public access and pass the check\n```",
27+
"Other": "1. In AWS Console, open Amazon S3 Glacier (Classic)\n2. Go to Vaults and select the target vault\n3. Open the Access policy tab and click Edit\n4. Remove the policy (clear all content) or delete it\n5. Save changes",
28+
"Terraform": "```hcl\n# Glacier vault with no access policy (not public)\nresource \"aws_glacier_vault\" \"<example_resource_name>\" {\n name = \"<example_resource_name>\"\n # access_policy omitted to remove any public access and pass the check\n}\n```"
2029
},
2130
"Recommendation": {
22-
"Text": "Ensure vault policy does not have principle as *.",
23-
"Url": "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html"
31+
"Text": "Enforce **least privilege** on vault policies: restrict to specific AWS accounts or roles, avoid `Principal: '*'`, and grant only necessary actions. Apply **defense in depth** with **Vault Lock** for immutable retention and continuous review and monitoring of access to prevent broad or unintended exposure.",
32+
"Url": "https://hub.prowler.com/check/glacier_vaults_policy_public_access"
2433
}
2534
},
2635
"Categories": [

0 commit comments

Comments
 (0)