Check if SQS queues have policy set as Public
Risk
Sensitive information could be disclosed
Run this check with Prowler CLI
prowler aws --checks sqs_queues_not_publicly_accessible
Fix finding with Prowler CLIfixer
prowler aws --checks sqs_queues_not_publicly_accessible --fixer
ARN template
arn:aws:sqs:region:account-id:queue
Remediation
Terraform
https://docs.prowler.com/checks/aws/general-policies/ensure-sqs-queue-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform
Other
https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/SQS/sqs-queue-exposed.html
WUIReferences:
Review service with overly permissive policies. Adhere to Principle of Least Privilege.
Source Code
Resource Type
AwsSqsQueue