Storage Bucket Misconfiguration
highbucket-misconfiguration
Cloud storage buckets configured with overly permissive access policies
Information Disclosure
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1530 | Data from Cloud Storage Object | Collection |
Common Weakness Enumeration
Mitigating controls
ctrl-bucket-1- Block public access by default
ctrl-bucket-2- Implement bucket policies with least privilege
ctrl-bucket-3- Enable access logging and monitoring
ctrl-bucket-4- Use automated scanning for public buckets
ctrl-bucket-5- Encrypt all stored objects