How to protect against Amazon S3 breaches

In the last month there have been three relatively high profile data breaches on the Amazon S3 service.

The first exposed 60,000 files, that included sensitive government data. The second exposed the data of 198 million US voters and the third exposed around 6 million Verizon customer account pins.

In fact so prevalent are buckets that have been inadvertently made public on S3 that many hackers focus on discovering and exploring them. Hackers focus on regularly scanning S3 buckets using Apps and tools that are publicly available. In fact, this is so bad that Amazon is now reaching out to users with exposed buckets  to try and stop the hackers cashing in.

Imagine if you will that these breaches had occurred post GDPR next year, and that the information had contained data of EU citizens. The company who was the Data Controller would face a hefty fine of 4% of gross revenue or €20 million.

This is where solutions such as the Storage Made Easy File Fabric come into play, to help protect and govern information that is stored either on-premises and/or on-cloud.

To protect Amazon S3 data the File Fabric provides the following:

1. Never share another public bucket. The File Fabric enables secure sharing of files and folders  from buckets that are always kept private.

2. Choose whether to encrypt files stored on Amazon S3. If somehow files are exposed, they will not be able to be opened.

3. Setup and Audit Watch to inform you in real time when files are accessed.

4. Keep an automatic Audit log of all S3 file events.

This works ‘out of the box’ for SaaS hosted, IaaS dedicated server, or Enterprise File Fabric users.

Facebooktwitterredditpinterestlinkedinmailby feather
The following two tabs change content below.
The Leading Enterprise File Fabric

Latest posts by Storage Made Easy (see all)