To secure and address unauthorized access to S3 objects:
**Access Control Implementation:**
- Implement proper access controls and security measures to restrict unauthorized access
- Regularly review and update permissions to ensure they align with the principle of least privilege
- Ensure that access controls are properly configured to restrict unauthorized access
**Secure Data Storage:**
- Securely store sensitive data, such as access keys or tokens, preferably in protected custom settings, custom metadata, or Named Credentials
- Use Named Credentials for external service authentication to avoid hardcoded credentials in your code
- Provide evidence that the information stored in the S3 bucket is compiled from publicly available resources, if applicable
**Temporary Access Management:**
- Use pre-signed URLs for temporary access to S3 objects, ensuring they're time-limited and scoped to specific actions
- Validate and sanitize any parameters used in generating these URLs to prevent misuse
- Use HTTPS endpoints when communicating with S3 services
**Documentation and Compliance:**
- If there are findings related to S3 bucket vulnerabilities during AppExchange Security Review, document the use case clearly and provide supporting evidence in the false positives documentation
- Category: Cloud Storage Security
- Subcategory: S3 Access Control and Authorization