Minimise security risks in S3
Read more in our whitepaper on AWS security.
Minimise security risks in S3
Read more in our whitepaper on AWS security.
Few cloud services have opened up as many new opportunities for companies as Amazon Web Services (AWS). AWS is extremely powerful, scales flexibly, and is convenient to use. However, the latter can also be treacherous: Its intuitive interface tempts users to simply push data into the cloud without considering proper security measures.
This happens particularly easily in Amazon S3, the Simple Storage Service. As the name suggests, this is actually nothing more than data storage in the cloud. It is organized in so-called buckets. A bucket is a container for the objects that are stored there, such as files.
Unlike on-premises (local) data storage, data in Amazon S3 is accessible from anywhere, independent of location. In addition, a huge corporation like Amazon can secure its data centers better than most companies on site: in a smaller company even an incident such as a break-in or flood can lead to data loss, but it takes much more serious disasters to put data availability at Amazon at risk.
Amazon also offers various so-called tiers for S3: these are graduated classes of service that a company can select according to how often, how quickly and how reliably it needs access to the data stored in the buckets. This provides additional efficiency: data that needs to be accessed particularly quickly is kept in the S3 standard tier. If the customer already knows that data needs to be accessed infrequently - for archiving purposes, for example - a less expensive tier can be chosen. And there is even the option of having this optimized by Amazon itself: In so-called Intelligent Tiering, machine learning is used to automatically move objects between standard and a less expensive tier, depending on previous access patterns.
All these seductive features of S3 have been the undoing of some companies in the past: They have used S3 too carelessly and thus experienced enormous, even existence-threatening difficulties. Amazon has repeatedly improved its security settings for S3 in order to protect customers from themselves, i.e. from accidental misconfigurations. But there are limits to this if the service is to remain as "simple" as the name promises.
Here is a quick overview of S3 data leaks over the past few years. This is not a complete list - and the number of unreported cases is high, as many companies manage to keep their mishaps out of the press.
Uber: In November 2017, media reported that Uber had made publicly accessible the personal data of 57 million passengers worldwide and about 600,000 U.S. drivers - again due to misconfigured S3 buckets. The data leak had happened the year before, when controversial Uber CEO Travis Kalanick had still been in office, but only became known in 2017.
Vulnerabilities like these can severely damage your company‘s reputation and customers‘, employees‘ and the public’s trust in you - perhaps irreparably. And the likelihood of misconfigurations being detected by others is increasing: There are now numerous publicly available tools that security researchers, as well as malicious attackers, can use to discover open S3 buckets on the web within seconds.
But data leaks in S3 are among the easiest security holes to close. There is virtually no reason to expose yourself to the risk of a misconfigured S3 bucket. The same goes for other configuration errors that can affect your organization's security in AWS: security is easier than you think.
Read more in our whitepaper on AWS security.
Read more in our whitepaper on AWS security.