This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
bucket_monitoring [2023/01/27 20:21] kaduuwikiadmin |
bucket_monitoring [2023/05/22 20:40] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Bucket Monitoring ====== | + | ====== Bucket |
===== Introduction ===== | ===== Introduction ===== | ||
Line 7: | Line 7: | ||
**The main S3 security risks** | **The main S3 security risks** | ||
- | While S3 is a strong way to store data cost-effectively and at scale, it can also pose risks. | + | Some of the most important S3 risks include: |
- Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets | - Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets | ||
Line 28: | Line 28: | ||
{{:: | {{:: | ||
+ | ===== What data should you look for? ===== | ||
+ | |||
+ | Basically any senstive data. Ususally only the own company knows best what is considered senstive according to the data classification. In general it can be said that sensitive data is any data that should not be accessible to unauthorized persons. Sensitive data may include personally identifiable information (PII), such as social security numbers, financial information, | ||