Overview
Overview
+Amazon S3 buckets can contain sensitive data that should be continuously discovered, classified, and protected. Amazon Macie and equivalent third-party solutions can help automate this process.
Remediation guidance
Perform the steps below to enable and configure Amazon Macie From Console
- Log on to the Macie console at
https://console.aws.amazon.com/macie/ - Click
Get started. - Click
Enable Macie.
Setup a repository for sensitive data discovery results
- In the Left pane, under Settings, click
Discovery results. - Make sure
Create bucketis selected. - Create a bucket, enter a name for the bucket. The name must be unique across all S3 buckets. In addition, the name must start with a lowercase letter or a number.
- Click on
Advanced.5. Block all public access, make sureYesis selected. - KMS encryption, specify the AWS KMS key that you want to use to encrypt the results. The key must be a symmetric, customer master key (CMK) that's in the same Region as the S3 bucket.
- Click on
Save
Create a job to discover sensitive data
- In the left pane, click
S3 buckets. Macie displays a list of all the S3 buckets for your account. - Select the
check boxfor each bucket that you want Macie to analyze as part of the job - Click
Create job. - Click
Quick create. - For the Name and description step, enter a name and, optionally, a description of the job.
- Then click
Next. - For the Review and create step, click
Submit.
Review your findings
- In the left pane, click
Findings. - To view the details of a specific finding, choose any field other than the check box for the finding.
If you are using a 3rd Party tool to manage and protect your s3 data, follow the Vendor documentation for implementing and configuring that tool.
Service-wide remediation
Recommended when many resources are affected: fix the platform baseline first so new resources inherit the secure setting, then remediate the existing flagged resources in batches.
Platform
Use the provider or platform baseline, preventive policy, and IaC modules to enforce this setting consistently when many resources are affected.
Operational rollout
- Fix the baseline first at the account, subscription, project, cluster, or tenant scope that owns this control.
- Remediate the currently affected resources in batches, starting with internet-exposed and production assets.
- Re-scan and track approved exceptions with an owner and expiry date.
Query logic
These are the stored checks tied to this control.
No stored query bodies are attached to this entry.