[1] Manage S3 buckets in AWS Ansible project contributors
[2] There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets ACSAC '18: Proceedings of the 34th Annual Computer Security Applications Conference
[3] Blocking public access to your Amazon S3 storage Amazon Web Services, Inc.
[4] Standards Mapping - CIS Azure Kubernetes Service Benchmark
3[5] Standards Mapping - CIS Microsoft Azure Foundations Benchmark
complete[6] Standards Mapping - CIS Amazon Elastic Kubernetes Service Benchmark
3[7] Standards Mapping - CIS Amazon Web Services Foundations Benchmark
1[8] Standards Mapping - CIS Google Cloud Computing Platform Benchmark
complete[9] Standards Mapping - CIS Google Kubernetes Engine Benchmark
integrity[10] Standards Mapping - CIS Kubernetes Benchmark
complete[11] Standards Mapping - Common Weakness Enumeration
CWE ID 284, CWE ID 359[12] Standards Mapping - Common Weakness Enumeration Top 25 2019
[4] CWE ID 200[13] Standards Mapping - Common Weakness Enumeration Top 25 2020
[7] CWE ID 200[14] Standards Mapping - Common Weakness Enumeration Top 25 2021
[20] CWE ID 200[15] Standards Mapping - DISA Control Correlation Identifier Version 2
CCI-002475[16] Standards Mapping - FIPS200
CM[17] Standards Mapping - General Data Protection Regulation (GDPR)
Insufficient Data Protection[18] Standards Mapping - NIST Special Publication 800-53 Revision 4
SC-28 Protection of Information at Rest (P1)[19] Standards Mapping - NIST Special Publication 800-53 Revision 5
SC-28 Protection of Information at Rest[20] Standards Mapping - OWASP Top 10 2004
A8 Insecure Storage[21] Standards Mapping - OWASP Top 10 2007
A6 Information Leakage and Improper Error Handling[22] Standards Mapping - OWASP Top 10 2010
A6 Security Misconfiguration, A7 Insecure Cryptographic Storage, A8 Failure to Restrict URL Access[23] Standards Mapping - OWASP Top 10 2013
A6 Sensitive Data Exposure[24] Standards Mapping - OWASP Top 10 2017
A3 Sensitive Data Exposure[25] Standards Mapping - OWASP Top 10 2021
A01 Broken Access Control[26] Standards Mapping - OWASP API 2023
API8 Security Misconfiguration[27] Standards Mapping - OWASP Application Security Verification Standard 4.0
1.4.2 Access Control Architectural Requirements (L2 L3), 1.4.4 Access Control Architectural Requirements (L2 L3), 8.3.4 Sensitive Private Data (L1 L2 L3), 10.2.1 Malicious Code Search (L2 L3)[28] Standards Mapping - OWASP Mobile 2014
M2 Insecure Data Storage[29] Standards Mapping - Payment Card Industry Data Security Standard Version 1.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 8.4[30] Standards Mapping - Payment Card Industry Data Security Standard Version 1.2
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.6, Requirement 8.4[31] Standards Mapping - Payment Card Industry Data Security Standard Version 2.0
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.4[32] Standards Mapping - Payment Card Industry Data Security Standard Version 3.0
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[33] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[34] Standards Mapping - Payment Card Industry Data Security Standard Version 3.2.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[35] Standards Mapping - Payment Card Industry Data Security Standard Version 3.1
Requirement 3.2, Requirement 3.4, Requirement 4.2, Requirement 6.5.5, Requirement 8.2.1[36] Standards Mapping - Payment Card Industry Data Security Standard Version 4.0
Requirement 3.3.1, Requirement 3.5.1, Requirement 4.2.2, Requirement 6.2.4, Requirement 8.3.1[37] Standards Mapping - Payment Card Industry Software Security Framework 1.0
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[38] Standards Mapping - Payment Card Industry Software Security Framework 1.1
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[39] Standards Mapping - Payment Card Industry Software Security Framework 1.2
Control Objective 3.3 - Sensitive Data Retention, Control Objective 6.1 - Sensitive Data Protection[40] Standards Mapping - SANS Top 25 2010
Porous Defenses - CWE ID 863[41] Standards Mapping - SANS Top 25 2011
Porous Defenses - CWE ID 863[42] Standards Mapping - Security Technical Implementation Guide Version 3.1
APP3210.1 CAT II, APP3310 CAT I, APP3340 CAT I[43] Standards Mapping - Security Technical Implementation Guide Version 3.4
APP3210.1 CAT II, APP3340 CAT I[44] Standards Mapping - Security Technical Implementation Guide Version 3.5
APP3210.1 CAT II, APP3340 CAT I[45] Standards Mapping - Security Technical Implementation Guide Version 3.6
APP3210.1 CAT II, APP3340 CAT I[46] Standards Mapping - Security Technical Implementation Guide Version 3.7
APP3210.1 CAT II, APP3340 CAT I[47] Standards Mapping - Security Technical Implementation Guide Version 3.9
APP3210.1 CAT II, APP3340 CAT I[48] Standards Mapping - Security Technical Implementation Guide Version 3.10
APP3210.1 CAT II, APP3340 CAT I[49] Standards Mapping - Security Technical Implementation Guide Version 4.1
APSC-DV-002340 CAT II[50] Standards Mapping - Security Technical Implementation Guide Version 4.2
APSC-DV-002340 CAT II[51] Standards Mapping - Security Technical Implementation Guide Version 4.3
APSC-DV-002340 CAT II[52] Standards Mapping - Security Technical Implementation Guide Version 4.4
APSC-DV-002340 CAT II[53] Standards Mapping - Security Technical Implementation Guide Version 4.5
APSC-DV-002340 CAT II[54] Standards Mapping - Security Technical Implementation Guide Version 4.6
APSC-DV-002340 CAT II[55] Standards Mapping - Security Technical Implementation Guide Version 4.7
APSC-DV-002340 CAT II[56] Standards Mapping - Security Technical Implementation Guide Version 4.8
APSC-DV-002340 CAT II[57] Standards Mapping - Security Technical Implementation Guide Version 4.9
APSC-DV-002340 CAT II[58] Standards Mapping - Security Technical Implementation Guide Version 4.10
APSC-DV-002340 CAT II[59] Standards Mapping - Security Technical Implementation Guide Version 4.11
APSC-DV-002340 CAT II[60] Standards Mapping - Security Technical Implementation Guide Version 5.1
APSC-DV-002340 CAT II[61] Standards Mapping - Security Technical Implementation Guide Version 5.2
APSC-DV-002340 CAT II[62] Standards Mapping - Security Technical Implementation Guide Version 5.3
APSC-DV-001410 CAT II, APSC-DV-001520 CAT II[63] Standards Mapping - Web Application Security Consortium Version 2.00
Information Leakage (WASC-13)[64] Standards Mapping - Web Application Security Consortium 24 + 2
Information Leakage