[1] Manage S3 buckets in AWS Ansible project contributors
[2] There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets ACSAC '18: Proceedings of the 34th Annual Computer Security Applications Conference
[3] Blocking public access to your Amazon S3 storage Amazon Web Services, Inc.
[4] Standards Mapping - CIS Amazon Web Services Foundations Benchmark
Recommendation 2.1.4[5] Standards Mapping - Common Weakness Enumeration
CWE ID 284, CWE ID 359[6] Standards Mapping - Common Weakness Enumeration Top 25 2019
[4] CWE ID 200[7] Standards Mapping - Common Weakness Enumeration Top 25 2020
[7] CWE ID 200[8] Standards Mapping - Common Weakness Enumeration Top 25 2021
[20] CWE ID 200[9] Standards Mapping - Common Weakness Enumeration Top 25 2024
[17] CWE ID 200[10] Standards Mapping - DISA Control Correlation Identifier Version 2
CCI-002038, CCI-002475[11] Standards Mapping - FIPS200
CM[12] Standards Mapping - General Data Protection Regulation (GDPR)
Insufficient Data Protection[13] Standards Mapping - NIST Special Publication 800-53 Revision 4
CM-5 Access Restrictions for Change (P1), IA-11 Re-Authentication (P0), SC-28 Protection of Information at Rest (P1)[14] Standards Mapping - NIST Special Publication 800-53 Revision 5
CM-5 Access Restrictions for Change, SC-11 Trusted Path, SC-28 Protection of Information at Rest[15] Standards Mapping - OWASP API 2023
API8 Security Misconfiguration[16] Standards Mapping - OWASP Application Security Verification Standard 4.0
1.4.2 Access Control Architectural Requirements (L2 L3), 1.4.4 Access Control Architectural Requirements (L2 L3), 8.3.4 Sensitive Private Data (L1 L2 L3), 10.2.1 Malicious Code Search (L2 L3)[17] Standards Mapping - OWASP Mobile 2014
M2 Insecure Data Storage[18] Standards Mapping - OWASP Top 10 2004
A8 Insecure Storage[19] Standards Mapping - OWASP Top 10 2007
A6 Information Leakage and Improper Error Handling[20] Standards Mapping - OWASP Top 10 2010
A6 Security Misconfiguration, A7 Insecure Cryptographic Storage, A8 Failure to Restrict URL Access[21] Standards Mapping - OWASP Top 10 2013
A6 Sensitive Data Exposure[22] Standards Mapping - OWASP Top 10 2017
A3 Sensitive Data Exposure[23] Standards Mapping - OWASP Top 10 2021
A01 Broken Access Control[24] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 8.4[25] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.6, Requirement 8.4[26] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.4[27] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[28] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[29] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[30] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[31] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0
Requirement 3.3.1, Requirement 3.5.1, Requirement 4.2.2, Requirement 6.2.4, Requirement 8.3.1[32] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0.1
Requirement 3.3.1, Requirement 3.3.2, Requirement 3.3.3, Requirement 3.5.1, Requirement 4.2.2, Requirement 6.2.4, Requirement 8.3.1[33] Standards Mapping - Payment Card Industry Software Security Framework 1.0
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[34] Standards Mapping - Payment Card Industry Software Security Framework 1.1
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[35] Standards Mapping - Payment Card Industry Software Security Framework 1.2
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[36] Standards Mapping - SANS Top 25 2010
Porous Defenses - CWE ID 863[37] Standards Mapping - SANS Top 25 2011
Porous Defenses - CWE ID 863[38] Standards Mapping - Security Technical Implementation Guide Version 3.1
APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I[39] Standards Mapping - Security Technical Implementation Guide Version 3.4
APP3210.1 CAT II, APP3340 CAT I[40] Standards Mapping - Security Technical Implementation Guide Version 3.5
APP3210.1 CAT II, APP3340 CAT I[41] Standards Mapping - Security Technical Implementation Guide Version 3.6
APP3210.1 CAT II, APP3340 CAT I[42] Standards Mapping - Security Technical Implementation Guide Version 3.7
APP3210.1 CAT II, APP3340 CAT I[43] Standards Mapping - Security Technical Implementation Guide Version 3.9
APP3210.1 CAT II, APP3340 CAT I[44] Standards Mapping - Security Technical Implementation Guide Version 3.10
APP3210.1 CAT II, APP3340 CAT I[45] Standards Mapping - Security Technical Implementation Guide Version 4.2
APSC-DV-002340 CAT II[46] Standards Mapping - Security Technical Implementation Guide Version 4.3
APSC-DV-002340 CAT II[47] Standards Mapping - Security Technical Implementation Guide Version 4.4
APSC-DV-002340 CAT II[48] Standards Mapping - Security Technical Implementation Guide Version 4.5
APSC-DV-002340 CAT II[49] Standards Mapping - Security Technical Implementation Guide Version 4.6
APSC-DV-002340 CAT II[50] Standards Mapping - Security Technical Implementation Guide Version 4.7
APSC-DV-002340 CAT II[51] Standards Mapping - Security Technical Implementation Guide Version 4.8
APSC-DV-002340 CAT II[52] Standards Mapping - Security Technical Implementation Guide Version 4.9
APSC-DV-002340 CAT II[53] Standards Mapping - Security Technical Implementation Guide Version 4.10
APSC-DV-002340 CAT II[54] Standards Mapping - Security Technical Implementation Guide Version 4.11
APSC-DV-002340 CAT II[55] Standards Mapping - Security Technical Implementation Guide Version 4.1
APSC-DV-002340 CAT II[56] Standards Mapping - Security Technical Implementation Guide Version 5.1
APSC-DV-002340 CAT II[57] Standards Mapping - Security Technical Implementation Guide Version 5.2
APSC-DV-002340 CAT II[58] Standards Mapping - Security Technical Implementation Guide Version 5.3
APSC-DV-001410 CAT II, APSC-DV-001520 CAT II, APSC-DV-002340 CAT II[59] Standards Mapping - Security Technical Implementation Guide Version 6.1
APSC-DV-001410 CAT II, APSC-DV-001520 CAT II, APSC-DV-002340 CAT II[60] Standards Mapping - Web Application Security Consortium Version 2.00
Information Leakage (WASC-13)[61] Standards Mapping - Web Application Security Consortium 24 + 2
Information Leakage