S3 Protection
Last updated
Last updated
S3 Protection helps detect potential security risks like data exfiltration and destruction in Amazon S3 buckets. It uses Amazon GuardDuty to monitor AWS CloudTrail data events at the object level, identifying threats across all S3 buckets in your account.
Security Findings: GuardDuty generates findings based on suspicious object-level activities such as GetObject
, PutObject
, ListObjects
, and DeleteObject
API operations.
CloudTrail Data vs. Management Events:
Data events: Focus on object-level operations within S3.
Management events: Focus on management-level operations (e.g., creating or deleting buckets). Both are monitored by GuardDuty to detect threats.
Monitoring Scope: GuardDuty only monitors authenticated access to S3 objects using IAM or STS credentials. Public access (unauthenticated) events are ignored.
Enablement and Regional Scope: S3 Protection must be enabled for each Region where you use GuardDuty. It monitors only the buckets in the same Region where it is active.
Disabling: If S3 Protection is disabled, monitoring stops, and no further S3-specific findings will be generated.