

# s3-bucket-public-write-prohibited
<a name="s3-bucket-public-write-prohibited"></a>

Checks if your Amazon S3 buckets do not allow public write access. The rule checks the Block Public Access settings, the bucket policy, and the bucket access control list (ACL).

The rule is compliant when both of the following are true:
+ The Block Public Access setting restricts public policies or the bucket policy does not allow public write access.
+ The Block Public Access setting restricts public ACLs or the bucket ACL does not allow public write access.

The rule is noncompliant when:
+ If the Block Public Access setting does not restrict public policies, Amazon Config evaluates whether the policy allows public write access. If the policy allows public write access, the rule is noncompliant.
+ If the Block Public Access setting does not restrict public bucket ACLs, Amazon Config evaluates whether the bucket ACL allows public write access. If the bucket ACL allows public write access, the rule is noncompliant.

**Note**  
This rule does not evaluate changes to account level public block access. To check if the required public access block settings are configured from the account level, see [s3-account-level-public-access-blocks](https://docs.amazonaws.cn/config/latest/developerguide/s3-account-level-public-access-blocks.html) and [s3-account-level-public-access-blocks-periodic](https://docs.amazonaws.cn/config/latest/developerguide/s3-account-level-public-access-blocks-periodic.html).

**Note**  
To be considered non-public, an S3 bucket policy must grant access only to fixed values. This means a policy is NON\$1COMPLIANT if it grants access to a wildcard or the following IAM policy element: [Variables](https://docs.amazonaws.cn/IAM/latest/UserGuide/reference_policies_variables.html#policy-vars-using-variables). A fixed value containing a wildcard can still be COMPLIANT.



**Identifier:** S3\$1BUCKET\$1PUBLIC\$1WRITE\$1PROHIBITED

**Resource Types:** AWS::S3::Bucket

**Trigger type:** Configuration changes and Periodic

**Amazon Web Services Region:** All supported Amazon regions

**Parameters:**

None  

## Amazon CloudFormation template
<a name="w2aac20c16c17b7e1401c31"></a>

To create Amazon Config managed rules with Amazon CloudFormation templates, see [Creating Amazon Config Managed Rules With Amazon CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).