Blog

4 Common S3 Misconfigurations to Avoid


Conor Colgan

Author: Conor Colgan
Technical Product Manager
ClearDATA


Alteryx S3 leak leaves 123m American households exposed1 – Dec 19, 2017

Open AWS S3 bucket exposes private info on thousands of Fedex customers2 – Feb 15, 2018

Sensitive medical records on AWS bucket found to be publicly accessible3 – Jan 22, 2018

Headlines like those above have been becoming more prevalent over the last 6 months.  Companies have seen sensitive data, including Protected Health Information (PHI), exposed publicly due to a misconfiguration in their Amazon S3 bucket.  Often times, the data exposures are blamed on the S3 service itself, but the cause is more likely a lack of understanding of the service and its compliance controls.

S3 buckets are a location where you can store data, or objects, in a very flexible and scalable manner, using the standard HTTP protocol just like any website.  With this flexibility comes responsibility.  S3 can be configured to be privately accessible to only one user, or publicly available with all data available to anyone. In between those two extremes, customers can use access policies to provide extremely granular control of who can access the data located within a bucket.  These policies do require some education and based on the amount of data exposed recently, it would seem that further education may be required.

Let’s take a look at some of the top misconfigurations in S3, and how you can correct them:

  1. Permissions
    Permissions for S3 buckets are commonly set via bucket policies.  The permissions can be very powerful and granular, but they can also be very broad.  Users often set broad permissions on S3 buckets in order to speed up the initial deployment of the environment.  In that haste, someone might configure the bucket as Publicly Accessible, so all of the files hosted in it can be accessed by any part of the application.  The problem with that is, anyone with an internet browser could find the bucket by name and now has access to your files.

TIP: Use the powerful policies available and restrict access to the bucket in order to prevent unauthorized access to the data.

  1. Encryption
    S3 offers three options for encrypting the objects located in buckets: Server-Side Encryption-S3 with keys managed by the S3 service itself, Server-Side Encryption-KMS with keys managed by the Amazon Key Management Service, and Server-Side Encryption-Customer with keys managed by the customer.  Customers can use policies to ensure that objects uploaded into the bucket are encrypted, in order to protect the data from attackers or unauthorized personnel.  When processing sensitive data, this is crucial to your business.  It is highly recommended that encryption be implemented in order to protect your data from attackers or unauthorized personnel.

TIP: Use S3 Server-Side Encryption (SSE) and enable Amazon the ability to encrypt the data at the object level as it writes it to disks and decrypts it transparently for you when it is accessed.

  1. Audit Logging
    S3 buckets do not save audit logs by default, meaning if you do mistakenly open a bucket to the public you will not be able to review who accessed which files within your bucket.  An access log record contains details about the requests made to a bucket. The request can include the request type, the resources specified in the request, and the time and date the request was processed.  This information is incredibly powerful to ensure there is no unintended access to any data, and it should be turned on for all buckets that contain sensitive or important data.

TIP: Enable file level audit logging and save the logs to a central location, allowing you to perform an analysis of the logs in the event of a potential incident.

  1. Data Classification
    As discussed above, S3 buckets can be configured with public access.  While you would not want to make the bucket public if it contains sensitive data, what if you wanted to provide static images for your website or build a simple and low-cost web application?  S3 is the perfect use case for web service workloads, as it is extremely durable and low cost.  Occasionally, data that may require public access resides in the same bucket as protected health information.  This combination of differently classified data may put protected data at risk.  Just as you would separate workloads on different servers, you should also separate workloads into different S3 buckets. Tags can be used as a different classification dimension, noting that bucket contains sensitive data or publicly available data.  This helps your users understand what and how the buckets should and should not be used to ensure you both secure data and remain compliant.  The use of tags also helps you monitor the buckets to ensure that all of the best practices are followed when hosting sensitive data in your AWS account.

    TIP
    : Properly determine the classification of all data hosted in S3, such as “public”, or “confidential” or “protected”.  Don’t mix confidential or protected data with public data.

What now?

Speaking of monitoring, how do you know your buckets are following the guidelines?  Reviewing the current list of buckets to ensure they aren’t using broad access policies or encryption is not difficult, but it will take some time.  After you complete that audit, how do you know that the new engineer you just hired isn’t creating buckets that don’t follow the guidelines?  Those questions tend to create more questions.  What if you are new to the cloud, or if you are part of a highly regulated industry such as healthcare?  How can you ensure that your buckets are secure and compliant?  As a CSO or IT leader, do you need to learn how to manage Amazon S3 bucket policies, log into all of your company’s AWS accounts, locate each bucket, and audit every policy?  How often?

ClearDATA provides automation that will not only configure the settings mentioned above but it also enforces compliance with remediation throughout the lifecycle of your application called Automated Safeguards. With Automated Safeguards, you have direct access to the AWS console while our automation enforcing more than 40 technical controls, runs in the background, keeping you in an ideal state of compliance. ClearDATA offers Automated Safeguards for over 20 HIPAA eligible services from AWS, like S3; it’s available as part of our managed platform or as a standalone SaaS offering. Learn more here.

Additionally, ClearDATA’s Compliance Dashboard, provides the ability to prove a culture of compliance in a matter of seconds. The Compliance Dashboard monitors assets, including S3 buckets, in an AWS customer’s environment to ensure they adhere to the rules and regulations.  ClearDATA has taken their experience working with regulatory frameworks such as HIPAA, GxP, and GDPR, from multiple countries and mapped the S3 security controls to those frameworks, allowing customers to show compliance mapped to the appropriate regulations. You can learn more about the dashboard here.

Figure 1 Exact Framework Regulation
Figure 1. ClearDATA provides details that show the language of the exact framework regulation as well as the ClearDATA interpretation and guidance to meet that regulation.

 

Figure 2 The Compliance Dashboard
Figure 2. The Compliance Dashboard ensures that the common S3 misconfigurations are not present in your environment, providing a scorecard of each S3 bucket you want to monitor.
Figure 3 Trends Report
Figure 3. The Trends Report from the Compliance Dashboard monitors the compliance of other AWS assets, including EC2 and RDS, and maps the compliance over time. This powerful report can highlight your compliance monitoring policy, and how you have built a culture of compliance.

 

These reports allow you to create a culture of compliance and monitor your AWS assets, including S3 buckets, that contain your sensitive data.  They also allow you to demonstrate to your leadership, auditors, and customers that you are actively monitoring your cloud environment to ensure you are not the next headline.

Contact ClearDATA for more information about our Compliance Dashboard.


References:
[1] https://www.scmagazineuk.com/sensitive-medical-records-on-aws-bucket-found-to-be-publicly-accessible/article/738421/
[2] https://www.scmagazine.com/open-aws-s3-bucket-exposes-private-info-on-thousands-of-fedex-customers/article/744812/
[3] https://www.zdnet.com/article/alteryx-s3-leak-leaves-120m-american-households-exposed/

Never miss an update

Subscribe to get our monthly newsletter