IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

AWS adds default encryption to leaky S3 buckets

Amazon addresses spate of data breaches affecting S3 customers

Amazon Web Services (AWS) has finally addressed multiple data breaches resulting from unencrypted S3 buckets, adding basic protections to its cloud storage service.

The AA, Accenture, Verizon, Dow Jones and even the WWE are among a spate of companies that have suffered data leaks because they haven't secured their S3 storage, which AWS didn't encrypt by default.

Yet when Cloud Pro asked AWS what steps customers could take to mitigate the threat last week, it offered no comment.

The cloud giant's blog post this week did, however, with chief evangelist Jeff Barr outlining some new features customers can use to secure S3 buckets that are available now free of charge.

Amazon cloud customers can finally choose to encrypt their buckets by default, mandating that any objects entering a bucket must be stored in encrypted form, instead of having to adopt AWS's former policy that meant the bucket simply rejects unencrypted objects.

"While this helps them to meet their requirements, simply rejecting the storage of unencrypted objects is an imperfect solution," admitted Barr.

Instead, "if an unencrypted object is presented to S3 and the configuration indicates that encryption must be used, the object will be encrypted using [the] encryption option specified for the bucket," he explained.

There are three server-side encryption options available; SSE-S3, where the bucket manages the encryption keys; SSE-KMS, where AWS's Key Management Service looks after them; and SSE-C, where the user holds the keys.

AWS appears to have made it simple to enable encryption, too, with users wishing to create a new bucket on the S3 console just having to type the bucket's name, then hit 'Next', before selecting 'Default encryption' and choosing what kind they require.

The ribbed back of the Toshiba Tablet

Customers can secure existing buckets via a call to the PUT Bucket Encryption function, via an SSL connection and signing it off using AWS Signature Version 4.

Those who copy some mission-critical objects across to buckets in separate AWS accounts can toggle the destination buckets' encryption policies too, to ensure the data remains encrypted.

Bright orange icons reading 'Public' also denote any buckets that aren't encrypted in the S3 Console.

AWS has also included a warning sign when users click on a public-facing bucket's permissions to say "we highly recommend that you never grant any kind of public access to your S3 bucket".

The Toshiba Tablet

While the changes are now live and available today, AWS will charge customers as normal for any data transfers and calls to the Key Management Service and S3.

Main image credit: Bigstock

Body copy images credit: AWS

Featured Resources

The state of Salesforce: Future of business

Three articles that look forward into the changing state of Salesforce and the future of business

Free Download

The mighty struggle to migrate SAP to the cloud may be over

A simplified and unified approach to delivering Enterprise Transformation in the cloud

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

The Total Economic Impact™ Of IBM FlashSystem

Cost savings and business benefits enabled by FlashSystem

Free Download

Most Popular

Cyber attack on software supplier causes "major outage" across the NHS
cyber attacks

Cyber attack on software supplier causes "major outage" across the NHS

8 Aug 2022
Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022