Storage Bucket Misconfiguration

high

bucket-misconfiguration

Cloud storage buckets configured with overly permissive access policies

Information Disclosure

MITRE ATT&CK techniques

IDNameTactic
T1530 Data from Cloud Storage Object Collection

Common Weakness Enumeration

Mitigating controls

ctrl-bucket-1
Block public access by default
ctrl-bucket-2
Implement bucket policies with least privilege
ctrl-bucket-3
Enable access logging and monitoring
ctrl-bucket-4
Use automated scanning for public buckets
ctrl-bucket-5
Encrypt all stored objects

References