我通过 AWS Config 在我的 AWS 账户上部署了NIST CSF一致性包,以改善我的安全状况。由于s3-bucket-policy-grantee-check未通过,我的一项资源不符合要求。首先,尽管读了好几遍,我还是不明白它用简单的英语是什么意思(我希望有人能更简单地为我提供这种语言)。
我有以下存储桶政策,但似乎无法弄清楚为什么我无法摆脱这种违规行为:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "AWSCloudTrailAclCheck",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:GetBucketAcl",
"Resource": "arn:aws:s3:::cis-alarms-<account-number>"
},
{
"Sid": "AWSCloudTrailWrite",
"Effect": "Allow",
"Principal": {
"Service": "cloudtrail.amazonaws.com"
},
"Action": "s3:PutObject",
"Resource": "arn:aws:s3:::cis-alarms-<account-number>/AWSLogs/<account-number>/*",
"Condition": {
"StringEquals": {
"s3:x-amz-acl": "bucket-owner-full-control"
}
}
},
{
"Sid": "AllowSSLRequestsOnly",
"Effect": "Deny",
"Principal": "*",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::cis-alarms-<account-number>",
"arn:aws:s3:::cis-alarms-<account-number>/*"
],
"Condition": {
"Bool": {
"aws:SecureTransport": "false"
}
}
}
]
}
我究竟做错了什么?
PS。这是针对我在 CloudTrail 上创建跟踪时预置的存储桶,它将此存储桶创建为跟踪日志存储桶。