Overview
Interested in discounted pricing? Contact sales@cloudstoragesec.com for a Private Offer.
Protect data lakes, ingestion pipelines, and application workflows built on AWS storage by scanning for viruses, ransomware, trojans, and other malicious payloads before they propagate downstream.
WHY THIS SOLUTION IS DIFFERENT
- Support for Multiple Data Sources
- Purpose-built for AWS storage
- In-tenant, security-first architecture
- Flexible scanning models
- Static, Dynamic & Forensic Analysis
- Configuration visibility across buckets
- Rapid deployment with minimal operational overhead
SUPPORTED AWS STORAGE Built for AWS storage services including:
- Amazon S3
- Amazon EBS
- Amazon EFS
- Amazon FSx
Engines Identify malware at petabyte scale across all buckets by leveraging the power of Sophos, CSS Premium, or CSS Secure. Engines may be used simultaneously to optimize accuracy and performance.
Scanning Models Integrate the method that fits your needs to minimize process interruptions and eliminate service disruptions. Choose from:
- Event-Based Scanning Scan new or modified objects in real time when uploaded. (easy to integrate into workflows because low or no code changes are needed)
- Retroactive Scanning Scan existing objects on demand or on schedule for baselining and compliance audits.
- API-Based Scanning Scan objects inside or outside of AWS in real time via a REST API before they are written to storage. Ideal for migrations, new application builds, or workflows where scan results determine whether an object is accepted.
Analysis Perform static analysis without execution or detonate files in a sandbox using SophosLabs Intelix™. Files are segmented by bucket and account to support traceability and forensic investigation.
Configurations Identify buckets with secure and insecure permission policies through a unified dashboard to improve visibility into storage misconfigurations.
Setup Deploy via AWS CloudFormation or Terraform in less than 10 minutes. Initial bucket protection and scanning configuration takes less than 5 minutes.
Follow the Getting Started Guide: https://help.cloudstoragesec.com/getting-started/summary/
Security First The solution installs and operates entirely within your AWS account. Data never leaves your environment or region. Optional deployment models include centralized security services accounts, linked account management, and private VPC endpoints.
Case Studies https://cloudstoragesec.com/case-studies
Core Capabilities
- Automated serverless architecture
- Real-time & on-demand scanning
- Centralized management console with dashboards and detailed reporting
- Automatic discovery & scaling across multiple accounts & regions
- No file size or type limitations with CSS Premium
- Problem file remediation (Quarantine, Tag, Delete)
- Notifications and integrations with third-party ticketing systems, Slack, Microsoft Teams, Amazon Chime, SIEM platforms, Amazon SNS, AWS Security Hub, AWS CloudTrail, AWS Control Tower, AWS Transfer Family, and more
Flexible Pricing Choose between pay-as-you-go pricing based on scan volume or tiered plans with unlimited scanning. Private offers and prepaid discounts are available.
NOT TO MISS ARTICLES ON AWS https://aws.amazon.com/blogs/apn/integrating-amazon-s3-malware-scanning-into-your-application-workflow-with-cloud-storage-security/
Highlights
- In-tenant, cloud-native malware scanning for Amazon S3, Amazon EBS, Amazon EFS, and Amazon FSx with no external file transfer.
- Multi-engine virus detection using Sophos, CSS Premium, and CSS Secure with event-based, retroactive, and API scanning models.
- Protect data lakes and application workflows with real-time and on-demand scanning that scales across multi-account AWS environments.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/GB |
|---|---|---|
FreeTrial Usage | FreeTrial Usage | $0.00 |
Monthly Subscription - includes 100GB of premium engine scanning | Monthly Subscription - includes 100GB of premium engine scanning | $99.00 |
Scan 101-500GB per month | Scan 101-500GB per month | $0.80 |
Scan 501-1500GB per month | Scan 501-1500GB per month | $0.80 |
Scan 1501-3000GB per month | Scan 1501-3000GB per month | $0.80 |
Scan >=3001GB per month | Scan >=3001GB per month | $0.80 |
Scan pre-existing objects | Scan pre-existing objects | $0.80 |
Premium Engine per GB Add-on - pre-existing objects - Sophos | Premium Engine per GB Add-on - pre-existing objects - Sophos | $0.10 |
Premium Engine per GB Add-on - Sophos | Premium Engine per GB Add-on - Sophos | $0.10 |
Cloud Detonation - Static Analysis (Per File) | Cloud Detonation - Static Analysis (Per File) | $0.05 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Console Deployment and Permission Setup
- Amazon ECS
Container image
Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.
Version release notes
Additional details
Usage instructions
Subscribing to this product will take you through the sign-up and deployment process. Deployment consists of launching a CloudFormation Template provided to you on the last configuration page of signup (also located in the Help Docs). Once Stack creation is completed, look to the Stack Outputs for the Console access URL and open that in your browser. Any additional deployment and management tasks are performed from within the Console.
For detailed steps on how to subscribe, deploy and use the product, please review: http://help.cloudstoragesec.com/getting-started/how-to-subscribe/
Resources
Vendor resources
Support
Vendor support
If you need help during your 30-day free trial, we are happy to provide email support via support@cloudstoragesec.com . We respond to support requests via email during your 30-day free trial within 24 hours Monday through Friday. We can also provide more in-depth support via phone and web meetings for Proof of Concept (POC) engagements. If you would like more information about initiating a POC, please contact one of our experts at https://cloudstoragesec.com/contact . Cloud Storage Security also offers Premium Support and Professional Service plans for purchase in AWS Marketplace
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Automated file scanning has created a real‑time trust boundary for all external uploads
What is our primary use case?
My primary use case for Antivirus for Amazon S3 is to secure uploaded files before they are consumed by downstream systems. For example, one workflow involves users uploading documents such as PDFs or images to an S3 bucket via web applications. Since all these files come from external resources, we treat them as untrusted. When a file is uploaded to S3 , it triggers an event notification that invokes an AWS Lambda function. The Lambda pulls the objects and scans them using an antivirus engine such as ClamAV. If the file is clean, the tag is set to safe, and it is moved to a processed bucket where downstream services can access it. If it is infected, we quarantine the file in a separate bucket and trigger alerts via SNS and Slack for visibility.
What is most valuable?
Antivirus for Amazon S3 offers several best features, including automatic malware scanning. The core feature automatically scans files when they are uploaded to S3, detecting viruses, ransomware, Trojans, and other threats. When working with trusted inputs, user uploads, third-party data, and event-driven and real-time processing, the service provides object tagging and metadata-based decisions, automated responses, multiple scanning engines, visibility logging and integration, fully managed and scalable infrastructure, flexible scanning modes, and compliance with security standards such as ISO 27001 and SOC 2 for secure data injected into pipelines.
The two features I find most valuable in Antivirus for Amazon S3 are event-driven scanning and object tagging. Event-driven scanning stands out because it makes the entire workflow real-time and automatic. As soon as a file is uploaded to S3, it gets scanned without any manual trigger. This is critical in production because it ensures no untrusted files sit around waiting to be processed; threats are handled immediately. Object tagging is equally important because it simplifies downstream decisions. Instead of tightly coupling services, we rely on tags such as 'clean' and 'infected'. For example, only files tagged as 'safe' are picked up by processing jobs. This approach keeps the jobs loosely coupled and easy to scale.
Antivirus scanning has a clear positive impact on security, automation, and developer velocity in my organization. From a security standpoint, it has eliminated the risk of malicious files entering downstream systems. Before this implementation, uploaded files were a blind spot. Now we ensure a restricted trust boundary where only scanned and verified files are allowed to move forward. We saw a reduction in security incidents related to file uploads because threats were stopped at injection. This helps us enforce a zero-trust approach for all external data. From a reliability perspective, failed scans default to untrusted, so nothing slips through.
What needs improvement?
One area for improvement in Antivirus for Amazon S3 is in handling large files efficiently. More seamless native support for large object scanning without needing custom ECS Fargate setups would simplify the architecture. Another improvement would be deeper policy control. The service also needs better visibility and reporting for logs and events. Cost optimization is frequently needed because scanning can become more expensive at scale, so smarter detection or scaling mechanisms would help reduce redundant scans. Additionally, better workflows for handling false positives, such as automating a rescan or approval pipelines, would reduce operational overhead.
Integration, support, and documentation are areas where Antivirus for Amazon S3 has room to improve. From an integration standpoint, setting up antivirus scanning often requires stitching together multiple services including S3, events, Lambda, IAM roles, and sometimes EC2 or EFS for large workloads. Having more native integration would be beneficial. On the support side, troubleshooting can be challenging, especially when a scan fails due to timeouts. The documentation is decent, but it is often fragmented. Having one or more end-to-end reference architectures, especially for real-world scenarios such as high-volume uploads or large file handling, would be helpful.
For how long have I used the solution?
I have been working with antivirus scanning for Antivirus for Amazon S3 for approximately three years.
What do I think about the scalability of the solution?
We have seen a measurable impact from using Antivirus for Amazon S3. There were several measurable improvements after we implemented antivirus scanning. From a security perspective, we reduced the risk of malicious file injection significantly. We ensured scans happened asynchronously so it did not impact user-facing latency. For scalability metrics, we have implemented security measures to handle spikes in uploads without additional operational overhead. For false positive handling, we tuned the system to minimize false positives, which reduced unnecessary alerts.
What other advice do I have?
One important point to add is that the workflow with Antivirus for Amazon S3 has significantly improved our security posture without slowing down development. Before implementing antivirus scanning, there was always a risk of malicious files being consumed by downstream services. By automatically scanning at the S3 level, we created a clear trust boundary where only verified files could move forward.
My advice to others looking into Antivirus for Amazon S3 is to design it as part of your pipeline from day one, not as an afterthought. First, treat all uploaded files as untrusted and enforce a clear flow. Scan immediately at upload and only allow clean files to move forward to avoid a security gap later. Second, keep the architecture simple and event-driven. Third, plan for scale early, especially for large files. Finally, invest in monitoring and failure handling. Ensure failed scans default to untrusted and set up alerts so nothing slips through silently. I would rate my overall experience with Antivirus for Amazon S3 as an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Automated scanning has provided continuous data protection and supports audit readiness
What is our primary use case?
My main use case for Antivirus for Amazon S3 is to utilize an S3 bucket to put static content in, as part of a web app proof of concept that I have been running, and also user content generated from the website. Sometimes I back that up and store it in S3 . Using Antivirus for Amazon S3