0% found this document useful (0 votes)
245 views1 page

Aws Security Checklist Report

The AWS Security Checklist Report provides recommendations for securing S3 buckets. It recommends enabling versioning and encryption to protect against data loss and unauthorized access. It also recommends using IAM policies to control access, enabling logging for auditing, and integrating with services like AWS Config and CloudTrail for continuous monitoring and compliance. Additional recommendations include implementing policies, tagging, and lifecycle rules to automate management and access controls for S3 buckets and objects.

Uploaded by

Esa Firmansyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
245 views1 page

Aws Security Checklist Report

The AWS Security Checklist Report provides recommendations for securing S3 buckets. It recommends enabling versioning and encryption to protect against data loss and unauthorized access. It also recommends using IAM policies to control access, enabling logging for auditing, and integrating with services like AWS Config and CloudTrail for continuous monitoring and compliance. Additional recommendations include implementing policies, tagging, and lifecycle rules to automate management and access controls for S3 buckets and objects.

Uploaded by

Esa Firmansyah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

AWS Security Checklist Report

AWS Security Checklist - S3

Item Description

Enable versioning Enable versioning for your S3 buckets to protect against accidental deletion or overwrite.

Enable encryption Enable encryption for your S3 buckets to protect against unauthorized access to your data at
in S3 rest.

Create IAM Use IAM policies to control access to your S3 buckets and objects.
policies

Enable object lock Enable object lock to prevent objects from being deleted or overwritten for a defined retention
period.

Enable bucket Enable access logging on your S3 buckets to monitor and analyze access patterns and
logging identify potential security risks.

Enable CloudTrail Integrate your S3 buckets with AWS CloudTrail to capture and store data events for auditing
integration and compliance purposes.

Enable AWS Enable AWS Config to continuously monitor and record your S3 bucket configurations and
Config evaluate them against best practices.

Set up S3 event Configure S3 event notifications to send messages when specific events occur in your S3
notifications buckets, such as object creation or deletion.

Implement bucket Use S3 bucket policies to manage permissions at the bucket level, controlling access to all
policies objects within a bucket.

Set up CORS Configure Cross-Origin Resource Sharing (CORS) to control which origins can access your
configurations S3 buckets and objects.

Enable MFA Enable Multi-Factor Authentication (MFA) Delete to require additional authentication when
Delete deleting objects or changing bucket versioning settings.

Enable transfer Enable S3 Transfer Acceleration to improve data transfer speed and reduce latency for your
acceleration S3 buckets.

Implement bucket Use bucket tagging to organize and manage your S3 buckets and enable cost allocation
tagging tracking.

Configure lifecycle Set up lifecycle policies to automate the management of objects in your S3 buckets, such as
policies transitioning objects to different storage classes or deleting objects.

Implement public Use S3 Block Public Access settings to prevent public access to your S3 buckets and objects.
access blocking

Use VPC Create VPC endpoints for Amazon S3 to securely access your buckets over a private network
endpoints connection.

This report has been generated by awscheck.fyi

You might also like