Checks whether the bucket policy of each Object Storage Service (OSS) bucket whose Bucket ACL parameter is set to Public Read/Write is configured and the read and write permissions are not granted to anonymous accounts in the bucket policy. If so, the evaluation result is Compliant.
Scenarios
This rule applies when you need to configure a bucket policy for an OSS bucket. We recommend that you do not grant the read and write permissions on an OSS bucket to anonymous accounts in a bucket policy. This helps prevent unauthorized access to the OSS bucket and ensures data security.
Risk level
Default risk level: high.
When you apply this rule, you can change the risk level based on your business requirements.
Compliance evaluation logic
- If the bucket policy of each OSS bucket whose Bucket ACL parameter is set to Public Read/Write is configured and the read and write permissions are not granted to anonymous accounts in the bucket policy, the evaluation result is Compliant.
- This rule does not apply to OSS buckets whose Bucket ACL parameter is set to Private.
- If the bucket policy of an OSS bucket whose Bucket ACL parameter is set to Public Read/Write is not configured, the evaluation result is Incompliant. If the bucket policy of an OSS bucket whose Bucket ACL parameter is set to Public Read/Write is configured but the read and write permissions are granted to anonymous accounts in the bucket policy, the evaluation result is also Incompliant. For more information about how to remediate an incompliant configuration, see Incompliance remediation.
Rule details
Item | Description |
---|---|
Rule name | oss-bucket-anonymous-prohibited |
Rule identifier | oss-bucket-anonymous-prohibited |
Tag | OSS, Bucket, and BucketPolicy |
Automatic remediation | Not supported |
Trigger type | Configuration change |
Supported resource type | OSS bucket |
Input parameter | None. |
Incompliance remediation
Grant specified users the permissions on an OSS bucket. For more information, see Overview.