From b6e04f507c55ef460ecb88a13b4c6bc0ad34eded Mon Sep 17 00:00:00 2001 From: mchennai <50082780+mchennai@users.noreply.github.com> Date: Fri, 26 Dec 2025 12:31:24 +0100 Subject: [PATCH] fix(metadata): Remediation URL for s3_bucket_server_access_logging_enabled (#9693) --- .../s3_bucket_server_access_logging_enabled.metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json index 4abf350dee..67fe62f840 100644 --- a/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json @@ -23,7 +23,7 @@ }, "Recommendation": { "Text": "Ensure that S3 buckets have Logging enabled. CloudTrail data events can be used in place of S3 bucket logging. If that is the case, this finding can be considered a false positive.", - "Url": "https://docs.aws.amazon.com/AmazonS3/latest/dev/security-best-practices.html" + "Url": "https://docs.aws.amazon.com/AmazonS3/latest/userguide/security-best-practices.html" } }, "Categories": [