How to Find AWS S3 Buckets Without MFA Delete Enabled
Your security credentials are compromised or unauthorized access is granted.
info
This security check is part of the CIS Amazon Web Services Benchmarks and is rated severity medium.
Prerequisites
This guide assumes that you have already installed and configured Fix Inventory to collect your AWS resources.
Directions
-
Execute the following
search
command in Fix Inventory Shell:> search is(aws_s3_bucket) and bucket_mfa_delete=false
kind=aws_s3_bucket, ..., region=fixinventory-poweruser
kind=aws_s3_bucket, ..., account=poweruser-team -
Pipe the
search
command into thedump
command:> search is(aws_s3_bucket) and bucket_mfa_delete=false | dump
reported:
id: /aws/s3/123
name: some-name
ctime: '2022-12-05T22:53:14Z'
kind: aws_s3_bucket
age: 2mo28dThe command output will list the details of all non-compliant
aws_s3_bucket
resources.
Remediation
- Add MFA delete to an S3 bucket.
- It requires additional authentication when you change the version state of your bucket, or you delete and object version adding another layer of security in the event your security credentials are compromised or unauthorized access is granted.
note
Please refer to the AWS S3 documentation for details.