

# cloudtrail-s3-bucket-public-access-prohibited


Checks if the S3 bucket configurations for your AWS CloudTrail logs block public access. The rule is NON\$1COMPLIANT if at least one S3 bucket for a CloudTrail trail is publicly accessible. 



**Identifier:** CLOUDTRAIL\$1S3\$1BUCKET\$1PUBLIC\$1ACCESS\$1PROHIBITED

**Resource Types:** AWS::CloudTrail::Trail

**Trigger type:** Periodic

**AWS Region:** All supported AWS regions except Asia Pacific (New Zealand), Asia Pacific (Thailand), Asia Pacific (Malaysia), Mexico (Central), Asia Pacific (Taipei), Canada West (Calgary) Region

**Parameters:**

None  

## AWS CloudFormation template


To create AWS Config managed rules with AWS CloudFormation templates, see [Creating AWS Config Managed Rules With AWS CloudFormation Templates](aws-config-managed-rules-cloudformation-templates.md).