Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Valid use of AWS_S3_BUCKET_AUTH and AWS_S3_PUBLIC_URL #114

Closed
ipmb opened this issue Aug 27, 2020 · 3 comments
Closed

Valid use of AWS_S3_BUCKET_AUTH and AWS_S3_PUBLIC_URL #114

ipmb opened this issue Aug 27, 2020 · 3 comments

Comments

@ipmb
Copy link
Contributor

ipmb commented Aug 27, 2020

When using Cloudfront as a CDN, it is possible to have your S3 bucket be private, but give permission to Cloudfront to serve files from it. This isn't currently possible with django-s3-storage because the combination of those settings raises an ImproperlyConfigured error. If you have the S3 bucket public access block setup, uploads with public-read set will be denied.

One reason you might want to configure it this way is to pass the AWS Foundational Security Controls check: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-fsbp-controls.html#fsbp-s3-2

@etianen
Copy link
Owner

etianen commented Aug 27, 2020 via email

@ipmb
Copy link
Contributor Author

ipmb commented Aug 27, 2020

Cloudfront does not require auth parameters, they are open for public access. It makes the security control more security theater than an actual security control, but in audits, sometimes that's needed :/

@etianen
Copy link
Owner

etianen commented Aug 27, 2020 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants