Amazon S3 buckets and objects are accessible from the Internet. The AWS security controls used to protect other...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
resources, such as security groups and network access control lists, do not protect data in S3. But here are several ways to protect the confidentiality, integrity and availability of data in S3.
By default, objects created in Amazon Simple Storage Service (S3) are only accessible to the person who created them. Owners can grant access to others in both coarse-grained and fine-grained ways. An owner, for example, could make a data set publicly available so anyone with the URL to the object can access it.
Alternatively, owners can use S3 policies and Identity and Access Management users and groups to allow access to a limited set of users. S3 policies can also restrict operations based on network connection properties. If you want only users on your corporate network to access objects in S3, specify that all connections come from a range of trusted IP addresses. Attempts to access objects from other addresses would be denied.
If you want to ensure data that has been downloaded from S3 is encrypted, deny access to any connection that is not SSL encrypted.
Encrypting data in Amazon S3 buckets
There are a few ways to implement encryption at rest in S3. If you use AWS Key Management Service, you can use server-side encryption and allow Amazon Web Services (AWS) to manage the encryption keys. To manage your own keys, you'll need to use server-side encryption keys and manage them in-house. The third option is to encrypt data before sending it to AWS. In this scenario, you manage all aspects of the encryption process.
Auditing is an important security process for protecting data in S3. Storage administrators can configure Amazon S3 buckets to log details of all requests that are made to a particular bucket. They can then store the log files in other Amazon S3 buckets with different access control permissions to minimize the chance of tampering.
Manage AWS security controls
AWS wins trust of enterprises with security features
AWS Key Management Service encrypts cloud data
Related Q&A from Dan Sullivan
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan ...continue reading
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of ...continue reading
Dropbox API abused by attackers posing as legitimate users in a huge spear phishing campaign. Expert Dan Sullivan explains how to mitigate the risks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.