After Enabling S3 Malware Protection
Overview
The following are steps to complete after enabling S3 Malware on a protected bucket.
Steps
Add Tag-Based Access Control (TBAC) Policy:
If you enabled tagging, set up a TBAC policy for the S3 bucket to control access to potentially malicious objects.
Monitor Malware Protection Plan Status:
Track the Status column in the GuardDuty console for each protected bucket to ensure the plan is active.
Upload Objects to the Protected Bucket:
Use the Amazon S3 console to upload files to the bucket or specific object prefixes covered by Malware Protection.
Monitor S3 Object Scan Status and Results:
If GuardDuty is enabled:
Malware findings may be generated to indicate the presence of malicious content.
Use tools like EventBridge, CloudWatch metrics, and S3 object tags to monitor scan results.
If Malware Protection is enabled without GuardDuty:
Use the same monitoring options—EventBridge, CloudWatch metrics, and S3 object tags—to track scan outcomes and ensure the health of uploaded objects.
Last updated