π‘οΈ Google Storage Bucket is anonymously or publicly accessibleπ’
- Contextual name: π‘οΈ Bucket is anonymously or publicly accessibleπ’
- ID:
/ce/ca/google/storage/storage-bucket-public-access - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Check for Publicly Accessible Cloud Storage Buckets
Descriptionβ
Descriptionβ
It is recommended that IAM policy on Cloud Storage bucket does not allows anonymous or public access.
Rationaleβ
Allowing anonymous or public access grants permissions to anyone to access bucket content. Such access might not be desired if you are storing any sensitive data. Hence, ensure that anonymous or public access to a bucket is not allowed.
Impactβ
No storage buckets would be publicly accessible. You would have to explicitly administer bucket access.
Auditβ
From Google Cloud Consoleβ
- Go to
Storage browserby visiting https://console.cloud.google.com/storage/browser.- Click on each bucket name to go to its
Bucket detailspage.- Click on the
Permissionstab.- Ensure that
allUsersandallAuthenticatedUsersare not in theMemberslist.From Google Cloud CLIβ
List all buckets in a project
gsutil lsCheck the IAM Policy for each bucket:
gsutil iam get gs://BUCKET_NAMENo role should contain
allUsersand/orallAuthenticatedUsersas a member.Using Rest APIβ
... see more
Remediationβ
Remediationβ
From Google Cloud Consoleβ
- Go to
Storage browserby visiting https://console.cloud.google.com/storage/browser.- Click on the bucket name to go to its
Bucket detailspage.- Click on the
Permissionstab.- Click
Deletebutton in front ofallUsersandallAuthenticatedUsersto remove that particular role assignment.From Google Cloud CLIβ
Remove
allUsersandallAuthenticatedUsersaccess.gsutil iam ch -d allUsers gs://BUCKET_NAME
gsutil iam ch -d allAuthenticatedUsers gs://BUCKET_NAME