Check provider logo

Check if SQS queues have policy set as Public

sqs_queues_not_publicly_accessible

Severitycritical
Servicesqs
by Prowler

Check if SQS queues have policy set as Public

Risk

Sensitive information could be disclosed

Run this check with Prowler CLI

prowler aws --checks sqs_queues_not_publicly_accessible

Run in Prowler Cloud

Fix finding with Prowler CLIfixer

prowler aws --checks sqs_queues_not_publicly_accessible --fixer

ARN template

arn:aws:sqs:region:account-id:queue

Remediation

Terraform

https://docs.prowler.com/checks/aws/general-policies/ensure-sqs-queue-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it#terraform

Other

https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/SQS/sqs-queue-exposed.html

WUI

Review service with overly permissive policies. Adhere to Principle of Least Privilege.

References:

Source Code

References

Resource Type

AwsSqsQueue

Related URL