User Tools

Site Tools


bucket_monitoring

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
bucket_monitoring [2023/01/27 20:21]
kaduuwikiadmin
bucket_monitoring [2023/05/22 20:40] (current)
Line 1: Line 1:
-====== Bucket Monitoring ======+====== Bucket and Cloud Storage Monitoring ======
  
 ===== Introduction ===== ===== Introduction =====
Line 7: Line 7:
 **The main S3 security risks** **The main S3 security risks**
  
-While S3 is a strong way to store data cost-effectively and at scale, it can also pose risks. Some of the most important S3 risks include:+Some of the most important S3 risks include:
  
   - Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets   - Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets
Line 28: Line 28:
 {{::bucket2.png?800|}} {{::bucket2.png?800|}}
  
 +===== What data should you look for? =====
 +
 +Basically any senstive data. Ususally only the own company knows best what is considered senstive according to the data classification. In general it can be said that sensitive data is any data that should not be accessible to unauthorized persons. Sensitive data may include personally identifiable information (PII), such as social security numbers, financial information, or login credentials. A sensitive data compromise occurs when an organization unknowingly discloses sensitive data or when a security incident results in the accidental or unlawful destruction, loss, alteration, or unauthorized disclosure of or access to sensitive data. Such data compromise may result from inadequate protection of a database, misconfigurations when setting up new instances of data storage, inappropriate use of data systems, etc.
  
  
  
  
bucket_monitoring.1674847296.txt.gz ยท Last modified: 2023/05/22 20:40 (external edit)