Ensure that your Object Storage Service (OSS) objects are not publicly accessible to the Internet in order to protect against unauthorized access. Allowing public, anonymous access through object ACLs gives everyone the ability to access the object's data.
Granting public and/or anonymous access to your Object Storage Service (OSS) objects can pose significant security risks. It increases the likelihood of unauthorized access, data breaches, and potential exploitation of sensitive information. Keeping access restricted helps maintain control over your data, safeguarding it from malicious actors and ensuring compliance with privacy regulations. And while an OSS bucket ACL may restrict public access to storage, individual object ACLs could still grant public access to specific objects within the bucket. Therefore, it's crucial to review object ACLs at the individual object level to ensure comprehensive access control measures are in place.
Audit
To determine if there are publicly accessible objects in your OSS buckets, perform the following operations:
Remediation / Resolution
To ensure that there are no publicly accessible objects stored within your OSS buckets, perform the following operations:
References
- Alibaba Cloud Documentation
- Overview
- Bucket ACLs
- Overview
- Object ACLs
- ossutil Documentation
- Run the ls command to list buckets, objects, and parts within an account
- stat
- set-acl