Control: 2.1.3 Ensure all data in Amazon S3 has been discovered, classified, and secured when necessary
Description
Amazon S3 buckets can contain sensitive data that, for security purposes, should be discovered, monitored, classified, and protected. Macie, along with other third-party tools, can automatically provide an inventory of Amazon S3 buckets.
Using a cloud service or third-party software to continuously monitor and automate the process of data discovery and classification for S3 buckets through machine learning and pattern matching is a strong defense in protecting that information.
Amazon Macie is a fully managed data security and privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS.
Remediation
Perform the steps below to enable and configure Amazon Macie:
From Console:
- Log on to the Macie console at https://console.aws.amazon.com/macie/
- Click
Get started
. - Click
Enable Macie
.
Setup a repository for sensitive data discovery results
- In the Left pane, under Settings, click
Discovery results
. - Make sure
Create bucket
is selected. - Create a bucket, enter a name for the bucket. The name must be unique across all S3 buckets. In addition, the name must start with a lowercase letter or a number.
- Click on
Advanced
. - For block all public access, make sure
Yes
is selected. - KMS encryption, specify the AWS KMS key that you want to use to encrypt the results. The key must be a symmetric, customer master key (CMK) that's in the same Region as the S3 bucket.
- Click on
Save
.
Create a job to discover sensitive data:
- In the left pane, click
S3 buckets
. Macie displays a list of all the S3 buckets for your account. - Check the box for each bucket that you want Macie to analyze as part of the job.
- Click
Create job
. - Click
Quick create
. - For the Name and description step, enter a name and, optionally, a description of the job.
- Click
Next
. - For the Review and create step, click
Submit
.
Review your findings
- In the left pane, click
Findings
. - To view the details of a specific finding, choose any field other than the check box for the finding.
If you are using a 3rd Party tool to manage and protect your s3 data, follow the Vendor documentation for implementing and configuring that tool.
Usage
Run the control in your terminal:
powerpipe control run aws_compliance.control.cis_v400_2_1_3
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run aws_compliance.control.cis_v400_2_1_3 --share
SQL
This control uses a named query:
s3_bucket_protected_by_macie