Zeus Cloud home pagelight logodark logo
  • Explore Demo
  • Explore Demo
Misconfigurations
S3
  • Documentation
  • GitHub
  • Demo
  • Community
  • Contact Us
  • Introduction
    • What is ZeusCloud?
    • Get Started
    • Rules
    • Alerts
    • Compliance
    • Customize
    Rules Catalog
    • Overview
    • Misconfigurations
      • CloudTrail
      • CloudWatch
      • EC2
      • ElasticSearch
      • ELBv2
      • IAM
      • KMS
      • RDS
      • S3
      • Secrets Manager
      • Security Hub
      • SQS
      • VPC
    • Attack Paths
    Contribute
    • Overview
    • Development Guide
    • Add a Security Rule
    • Add to Asset Inventory
    • Add a Compliance Framework
    Community and Support
    • Troubleshooting
    • Community
    Misconfigurations

    S3

    ZeusCloud provides the following security rules for AWS S3:

    • S3 buckets should have server access logging enabled
    • Buckets should be configured with block public access settings
    • S3 buckets should have versioning enabled to help recover from data loss
    • S3 buckets should have at-rest server side encryption enabled by default
    • S3 buckets should deny HTTP requests
    • S3 buckets should have MFA delete enabled in the bucket versioning configuration
    • S3 buckets should not be publicly readable
    • S3 buckets should not be publicly writable
    RDSSecrets Manager
    twittergithublinkedin
    Powered by Mintlify