Control: AWS > PCI v3.2.1 > EC2 > 1 Amazon EBS snapshots should not be publicly restorable
This control checks whether Amazon Elastic Block Store snapshots are not publicly restorable by everyone, which makes them public. Amazon EBS snapshots should not be publicly restorable by everyone unless you explicitly allow it, to avoid accidental exposure of your company’s sensitive data.
You should also ensure that permission to change Amazon EBS configurations are restricted to authorized AWS accounts only. Learn more about managing Amazon EBS snapshot permissions in the Amazon EC2 User Guide for Linux Instances.
Remediation
- Open the Amazon EC2 console.
- In the navigation pane, under
Elastic Block Store
, choose Snapshots and then select your public snapshot. - Choose Permissions tab from metadata view section, click Edit
- Choose Private in
This snapshot is currently
- Choose Save
PCI requirement(s): 1.2.1, 1.3.1, 1.3.4, 1.3.4, 7.2.1
Resource Types
This control targets the following resource types:
Category
In Your Workspace
Developers
- tmod:@turbot/aws-pciv3-2-1#/control/types/ebsSnapshotNotPubliclyRestorable
- tmod:@turbot/turbot#/control/categories/compliancePci
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/aws-pciv3-2-1#/control/types/ebsSnapshotNotPubliclyRestorable"
Get Controls
Control Type URI
Category URI
GraphQL
CLI