πΌ [S3.12] ACLs should not be used to manage user access to S3 general purpose buckets
-
Contextual name: πΌ [S3.12] ACLs should not be used to manage user access to S3 general purpose buckets
-
ID:
/frameworks/aws-fsbp-v1.0.0/s3/12
-
Located in: πΌ Simple Storage Service (S3)
Descriptionβ
ACLs are legacy access control mechanisms that predate IAM. Instead of ACLs, we recommend using S3 bucket policies or AWS Identity and Access Management (IAM) policies to manage access to your S3 buckets.
Similarβ
- AWS Security Hub
- Internal
- ID:
dec-c-dfd02461
- ID:
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST SP 800-53 Revision 5 β πΌ AC-2(1) Account Management _ Automated System Account Management | 4 | 16 | ||
πΌ NIST SP 800-53 Revision 5 β πΌ AC-3 Access Enforcement | 15 | 4 | 17 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-3(7) Access Enforcement _ Role-based Access Control | 7 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control | 10 | |||
πΌ NIST SP 800-53 Revision 5 β πΌ AC-6 Least Privilege | 10 | 21 | 26 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|