AWS Storage Blog
Category: Security, Identity, & Compliance
Getting visibility into storage usage in multi-tenant HAQM S3 buckets
SaaS providers with multi-tenant environments use cloud solutions to dynamically scale their workloads as customer demand increases. As their cloud footprint grows, having visibility into each end-customer’s storage consumption becomes important to distribute resources accordingly. An organization can use storage usage data per customer (tenant) to adjust its pricing model or better plan its budget. […]
Consolidate and query HAQM S3 Inventory reports for Region-wide object-level visibility
Organizations around the world store billions of objects and files representing terabytes to petabytes of data. Data is often owned by different teams, departments, or business units, spanning multiple locations. As the amount of datastores, locations, and owners grow, you need a way to cost-effectively maintain visibility on important characteristics of your data, including based […]
How Orca Security efficiently shares encrypted HAQM EBS Snapshots
Orca Security, an AWS Partner, is an independent cybersecurity software provider whose agent-less cloud security environment is trusted by hundreds of enterprises globally. Orca makes cloud security simple for enterprises moving to and scaling with AWS with its patented SideScanning™ technology and Unified Data Model. Orca’s customers use HAQM Elastic Block Store (HAQM EBS) volumes […]
Disabling HAQM S3 access control lists with S3 Inventory
Access control lists (ACLs) define user access and the operations users can take on specific resources. HAQM Simple Storage Service (HAQM S3) was launched in 2006 with ACLs as its first authorization mechanism. Since 2011, HAQM S3 has also supported AWS Identity and Access Management (IAM) policies for managing access to S3 buckets, and it recommends […]
Authorize NFS clients outside of AWS with AWS IAM Roles Anywhere
Securely storing and authorizing access to data in the cloud is a top priority. One challenge faced by organizations is developing a consistent authorization experience to grant access to data for hybrid architectures. Workloads running on AWS can access data stored on services like HAQM Elastic File System (HAQM EFS) using AWS Identity and Access […]
Detect malware threats using AWS Transfer Family
Securely sharing files over SFTP, FTP, and FTPS is a staple within many business-to-business (B2B) workflows. Across industries, companies use file transfer to transmit inventory, invoice, and compliance information. It is critical for companies to make sure that shared files do not have any malicious content that could compromise their systems. Guaranteeing the shared files […]
Extending SAP workloads with AWS Transfer Family
Transfer protocols, such as Secure Shell (SSH) File Transfer Protocol (SFTP), File Transfer Protocol Secure (FTPS), and File Transfer Protocol (FTP) are essential for corporations to migrate file transfer workflows by integrating with existing authentication systems. These protocols are deeply embedded in business processes across many industries like financial services, healthcare, telecommunications, and retail. Companies […]
Encrypt and decrypt files with PGP and AWS Transfer Family
1/11/2024: Updates made due to CloudShell migration to HAQM Linux 2023 (AL2023). Protecting sensitive data is not a novel idea. Customers in industries like financial services and healthcare regularly exchange files containing sensitive data, including Personal Identifiable Information (PII) and financial records with their users. Pretty Good Privacy (PGP) encryption of these files is often […]
Find public HAQM S3 buckets in your AWS account
Data is key to business, and securing it from unintended access is a critical business activity. As cloud usage increases, this can be a significant task to address. You want to verify that you aren’t unintentionally exposing or sharing data publicly. Under the Shared Responsibility Model, AWS is responsible for protecting the infrastructure that runs […]
Disabling ACLs for existing HAQM S3 workloads with information in S3 server access logs and AWS CloudTrail
Access control lists (ACLs) are permission sets that define user access, and the operations users can take on specific resources. HAQM S3 was launched in 2006 with ACLs as its first authorization mechanism. Since 2011, HAQM S3 has also supported AWS Identity and Access Management (IAM) policies for managing access to S3 buckets, and recommends using […]