Skip to main content

CCC.Logging.C05: Ensure Log Bucket is Not Publicly Accessible

Control ID:CCC.Logging.C05
Title:Ensure Log Bucket is Not Publicly Accessible
Objective:Ensure that log storage buckets are not publicly accessible to prevent unauthorized access to sensitive log data. In addition, logs should be replicated to another cloud region to enhance availability, durability, and support disaster recovery requirements.
Control Family:
Identity and Access Management

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AA-05
0
-
NIST_800_53
AC-3
0
-
NIST_800_53
SC-7
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.Logging.C05.TR01When a log storage bucket is created, the bucket's access control settings MUST explicitly deny public read and write access.
tlp-red
tlp-amber
tlp-green
CCC.Logging.C05.TR02When the URL of a log storage bucket's object is accessed publicly, the action MUST be denied by bucket policy.
tlp-red
tlp-amber
tlp-green