s3-account-level-public-access-blocks - AWS Config

s3-account-level-public-access-blocks

Checks if the required public access block settings are configured from account level. The rule is only NON_COMPLIANT when the fields set below do not match the corresponding fields in the configuration item.

Note

If you are using this rule, ensure that S3 Block Public Access is enabled. The rule is change-triggered, so it will not be invoked unless S3 Block Public Access is enabled. If S3 Block Public Access is not enabled the rule returns INSUFFICIENT_DATA. This means that you still might have some public buckets. For more information about setting up S3 Block Public Access, see Blocking public access to your Amazon S3 storage.

Identifier: S3_ACCOUNT_LEVEL_PUBLIC_ACCESS_BLOCKS

Resource Types: AWS::S3::AccountPublicAccessBlock

Trigger type: Configuration changes (current status not checked, only evaluated when changes generate new events)

Note

This rule is only triggered by configuration changes for the specific region where the S3 endpoint is located. In all other regions, the rule is checked periodically. If a change was made in another region, there could be a delay before the rule returns NON_COMPLIANT.

AWS Region: All supported AWS regions except US ISO West, Middle East (Bahrain), US ISO East, Middle East (UAE), Asia Pacific (Hyderabad), Asia Pacific (Osaka), Asia Pacific (Malaysia), US ISOB East, Asia Pacific (Melbourne), Europe (Milan), Israel (Tel Aviv), Canada West (Calgary), Europe (Spain), Europe (Zurich) Region

Parameters:

IgnorePublicAcls (Optional)
Type: String
Default: True

IgnorePublicAcls is enforced or not, default True

BlockPublicPolicy (Optional)
Type: String
Default: True

BlockPublicPolicy is enforced or not, default True

BlockPublicAcls (Optional)
Type: String
Default: True

BlockPublicAcls is enforced or not, default True

RestrictPublicBuckets (Optional)
Type: String
Default: True

RestrictPublicBuckets is enforced or not, default True

AWS CloudFormation template

To create AWS Config managed rules with AWS CloudFormation templates, see Creating AWS Config Managed Rules With AWS CloudFormation Templates.