CloudWiki
Rules
Low

Ensure that S3 buckets have Object Lock feature enabled

Security & Compliance
Description

Amazon S3 Object Lock provides a feature to store objects using a write-once-read-many (WORM) model, which helps to ensure compliance and data protection by preventing the deletion or modification of objects for a specified retention period. Ensuring that S3 buckets have Object Lock enabled can help protect against accidental or malicious deletion or modification of objects.

Remediation

Amazon S3 Object Lock provides a feature to store objects using a write-once-read-many (WORM) model, which helps to ensure compliance and data protection by preventing the deletion or modification of objects for a specified retention period. Ensuring that S3 buckets have Object Lock enabled can help protect against accidental or malicious deletion or modification of objects.

To ensure that S3 buckets have Object Lock enabled, you should:

  1. Log in to the AWS Management Console and navigate to the S3 service.
  2. Select the S3 bucket for which you want to enable Object Lock.
  3. Click on the "Properties" tab and scroll down to the "Object lock" section.
  4. Click on the "Edit" button and select the "Enable object lock" option.
  5. Choose the appropriate retention mode (Compliance or Governance) and set the retention period.
  6. Click on the "Save changes" button to apply the configuration.

You can also use the AWS CLI or SDK to enable Object Lock on S3 buckets.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.