Resource Type: AWS > S3 > Bucket
The Bucket resource type is a part of the AWS Simple Storage Service (S3). Each S3 Bucket is a storage unit that can be used to store and retrieve any amount of data, at any time, from anywhere on the web.
Resource Context
Bucket is a part of the S3 service.
Each Bucket lives under a Region.
Controls
The primary controls for AWS > S3 > Bucket are:
- Access Logging
- ACL
- Active
- Approved
- CMDB
- Configured
- Discovery
- Encryption at Rest
- Encryption in Transit
- Policy
- Policy Statements
- Public Access Block
- ServiceNow
- Tags
- Usage
- Versioning
It is also targeted by these controls:
- AWS > CIS v1.4 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.01 - Ensure all S3 buckets employ encryption-at-rest (Manual)
- AWS > CIS v1.4 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.02 - Ensure S3 Bucket Policy is set to deny HTTP requests (Manual)
- AWS > CIS v1.4 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.03 - Ensure MFA Delete is enable on S3 buckets (Automated)
- AWS > CIS v1.4 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.04 - Ensure all data in Amazon S3 has been discovered, classified and secured when required. (Manual)
- AWS > CIS v1.4 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.05 - Ensure that S3 Buckets are configured with 'Block public access (bucket settings)' (Automated)
- AWS > CIS v1.4 > 3 - Logging > 3.10 - Ensure that Object-level logging for write events is enabled for S3 bucket (Automated)
- AWS > CIS v1.4 > 3 - Logging > 3.11 - Ensure that Object-level logging for read events is enabled for S3 bucket (Automated)
- AWS > CIS v2.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.01 - Ensure S3 Bucket Policy is set to deny HTTP requests
- AWS > CIS v2.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.02 - Ensure MFA Delete is enabled on S3 buckets
- AWS > CIS v2.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.03 - Ensure all data in Amazon S3 has been discovered, classified and secured when required
- AWS > CIS v2.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.04 - Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'
- AWS > CIS v2.0 > 3 - Logging > 3.10 - Ensure that Object-level logging for write events is enabled for S3 bucket
- AWS > CIS v2.0 > 3 - Logging > 3.11 - Ensure that Object-level logging for read events is enabled for S3 bucket
- AWS > CIS v3.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.01 - Ensure S3 Bucket Policy is set to deny HTTP requests
- AWS > CIS v3.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.02 - Ensure MFA Delete is enabled on S3 buckets
- AWS > CIS v3.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.03 - Ensure all data in Amazon S3 has been discovered, classified and secured when required
- AWS > CIS v3.0 > 2 - Storage > 2.01 - Simple Storage Service (S3) > 2.01.04 - Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'
- AWS > CIS v3.0 > 3 - Logging > 3.08 - Ensure that Object-level logging for write events is enabled for S3 bucket
- AWS > CIS v3.0 > 3 - Logging > 3.09 - Ensure that Object-level logging for read events is enabled for S3 bucket
- AWS > HIPAA > S3 > All S3 buckets should log S3 data events in CloudTrail
- AWS > HIPAA > S3 > S3 bucket cross-region replication should be enabled
- AWS > HIPAA > S3 > S3 bucket default encryption should be enabled
- AWS > HIPAA > S3 > S3 bucket default encryption should be enabled with KMS
- AWS > HIPAA > S3 > S3 bucket logging should be enabled
- AWS > HIPAA > S3 > S3 bucket object lock should be enabled
- AWS > HIPAA > S3 > S3 bucket versioning should be enabled
- AWS > HIPAA > S3 > S3 buckets should enforce SSL
- AWS > HIPAA > S3 > S3 buckets should prohibit public read access
- AWS > HIPAA > S3 > S3 buckets should prohibit public write access
- AWS > HIPAA > S3 > S3 public access should be blocked at account and bucket levels
- AWS > NIST 800-53 > S3 > All S3 buckets should log S3 data events in CloudTrail
- AWS > NIST 800-53 > S3 > S3 bucket cross-region replication should be enabled
- AWS > NIST 800-53 > S3 > S3 bucket default encryption should be enabled
- AWS > NIST 800-53 > S3 > S3 bucket logging should be enabled
- AWS > NIST 800-53 > S3 > S3 bucket object lock should be enabled
- AWS > NIST 800-53 > S3 > S3 bucket versioning should be enabled
- AWS > NIST 800-53 > S3 > S3 buckets should enforce SSL
- AWS > NIST 800-53 > S3 > S3 buckets should prohibit public read access
- AWS > NIST 800-53 > S3 > S3 buckets should prohibit public write access
- AWS > NIST 800-53 > S3 > S3 public access should be blocked at account and bucket levels
- AWS > NIST 800-53 > S3 > S3 public access should be blocked at bucket levels
- AWS > PCI v3.2.1 > S3 > 1 S3 buckets should prohibit public write access
- AWS > PCI v3.2.1 > S3 > 2 S3 buckets should prohibit public read access
- AWS > PCI v3.2.1 > S3 > 3 S3 buckets should have cross-region replication enabled
- AWS > PCI v3.2.1 > S3 > 4 S3 buckets should have server-side encryption enabled
- AWS > PCI v3.2.1 > S3 > 5 S3 buckets should require requests to use Secure Socket Layer
Quick Actions
- Disable all Block Public Access settings
- Disable Versioning
- Enable all Block Public Access settings
- Enable Encryption in Transit
- Enable Versioning
- Set Encryption at Rest to AWS Managed Key
- Set Encryption at Rest to AWS SSE
- Set Encryption at Rest to Customer Managed Key
- Set Encryption at Rest to None
- Set Tags
- Skip alarm for Active control
- Skip alarm for Active control [90 days]
- Skip alarm for Approved control
- Skip alarm for Approved control [90 days]
- Skip alarm for Encryption at Rest control
- Skip alarm for Encryption at Rest control [90 days]
- Skip alarm for Tags control
- Skip alarm for Tags control [90 days]
Category
In Your Workspace
- Controls by Resource Type report
- Policy Settings by Resource Type report
- Resources by Resource Type report
Developers
- tmod:@turbot/aws-s3#/resource/types/bucket
- tmod:@turbot/turbot#/resource/categories/storageContainer
- turbot graphql resource --id "tmod:@turbot/aws-s3#/resource/types/bucket"
Get Resource- select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/aws-s3#/resource/types/bucket';
- select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/aws-s3#/resource/types/bucket"';
- select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/aws-s3#/resource/types/bucket' and notification_type in ('resource_updated', 'resource_created');
Get ResourceGet Policy Settings (By Resource ID)Get Resource Notification
Resource Type URI
Category URI
GraphQL
CLI
Steampipe Query