AWS Storage Blog

Tag: AWS CloudTrail

Amazon S3 Batch Operations featured image

Streamline data management at scale by automating the creation of Amazon S3 Batch Operations jobs

Over time, Enterprises may need to undertake operations or make modifications to their data as part of general data management, to address changing business needs, or to comply with evolving data-management regulations and best practices. As datasets being generated, stored, and analyzed continue to grow exponentially, the need for simplified, scalable, and reproduceable data management […]

Amazon S3 featured image - new

Find public Amazon S3 buckets in your AWS account

Data is key to business, and securing it from unintended access is a critical business activity. As cloud usage increases, this can be a significant task to address. You want to verify that you aren’t unintentionally exposing or sharing data publicly. Under the Shared Responsibility Model, AWS is responsible for protecting the infrastructure that runs […]

S3 Security

Disabling ACLs for existing Amazon S3 workloads with information in S3 server access logs and AWS CloudTrail

Access control lists (ACLs) are permission sets that define user access, and the operations users can take on specific resources. Amazon S3 was launched in 2006 with ACLs as its first authorization mechanism. Since 2011, Amazon S3 has also supported AWS Identity and Access Management (IAM) policies for managing access to S3 buckets, and recommends using […]

Amazon S3 featured image - new

Retrieving previous versions of S3 bucket policies

When dealing with applications or storage, it is often helpful to log previous policy configurations and have the ability to retrieve them. This can help you managed and troubleshoot configuration changes and comply with security regulations. Amazon Simple Storage Service (Amazon S3) bucket policies are resource-based policies that you can use to grant access permissions […]

Protect your resources from unintended deletions through Rule Lock for Recycle Bin

Security and data protection are top-of-mind for AWS customers, especially when dealing with business-critical cloud resources. Customers want to protect their production data from accidental data loss as well as from emerging threats like ransomware, malicious insiders or account takeover attacks. On November 23rd, 2022, we added stronger controls to Recycle Bin through the Rule […]

Amazon EBS at re:Invent 2022: Protect data at rest, in transit, and in volume backups

Mission critical workloads need advanced data services for data protection. Amazon Elastic Block Store (EBS) not only provides high-performance block-level storage volumes for Amazon Elastic Compute Cloud (EC2) instances, but also offers comprehensive and consistent data protection capabilities designed to protect data on block storage. Customers have been using Amazon EBS for over a decade […]

AWS Transfer Family Featured Image

Customize file delivery notifications using AWS Transfer Family managed workflows

Enterprises and organizations that transfer files, both internally and with external parties, can benefit from having file-processing protocols that facilitate efficient and transparent file-transfer management. When transferring files, especially at scale, it is important to have visibility into the status of file transfer, and for you to able to process files as you receive them. […]

Amazon S3 Glacier Storage Classes

Restore data from Amazon S3 Glacier storage classes starting with partial object keys

When managing data storage, it is important to optimize for cost by storing data in the most cost-effective manner based on how often data is used or accessed. For many enterprises, this means using some form of cold storage or archiving for data that is less frequently accessed or used while keeping more frequently used […]

S3 Security

How Simon Data reduced encryption costs by using Amazon S3 Bucket Keys on existing objects

As more organizations look to operate faster and at scale, they need ways to meet critical compliance requirements and improve data security. Encryption is a critical component of a defense in depth strategy, and when used correctly, can provide an additional layer of protection above basic access control. However, workloads that access millions or billions […]