Security Checklist

MetaDefender for Secure Storage offers a checklist of the most common security practices, which if forgotten or misconfigured, can lead to huge security risks.

Note: For now, this feature is only available for Amazon S3 storage units.

TitleDescriptionImportanceNotes
1HTTPS (TLS) to access bucket dataUse HTTPS (TLS) to help prevent potential attackers from eavesdropping on or manipulating network traffic using person-in-the-middle or similar attacks.Critical
2Authenticated access to bucketsYour buckets should not be publicly available on the internet. They should be accessible only with authentication otherwise your organization is exposed to data leaks or potential cost increases.Critical
3Least privilege access principleSecurely control individual and group access to your AWS resources by making sure that used keys only have the required access level.MajorThis check is done at the bucket level. This means that the folder location configured in MetaDefender for Secure Storage might be compliant, but the check will fail because the bucket contains policies that allow a wildcard identity such as Principal "*" (which effectively means 'anyone') or allows a wildcard action "*" (which effectively allows the user to perform any action in the Amazon S3 bucket).
4Bucket versioningVersioning is a means of keeping multiple variants of an object in the same bucket. Enable versioning to preserve, retrieve, and restore every version of every object stored in your Amazon S3 bucket. With versioning, you can easily recover from both unintended user actions and application failures.Major
5Bucket access loggingEnable access logging to help identify security issues.Major
6Server-side encryptionRequest Amazon S3 to encrypt the objects in your bucket before saving on disks in its data centers, and then, decrypt them when you download the objects. Server-side encryption can help reduce risk to your data by encrypting the data with a key that is stored in a different mechanism than the mechanism that stores the data itself.Major
7Cross-region data replicationAlthough Amazon S3 stores your data across multiple geographically diverse Availability Zones by default, compliance requirements might dictate that you store data at even greater distances. Enable cross-region replication (CRR) to replicate data between distant AWS Regions to help satisfy these requirements. CRR enables automatic, asynchronous copying of objects across buckets in different AWS Regions.MinorThis check will fail when there are replication-rule filters based on object tags, because some of the objects that are not tagged won't be copied across the destination bucket.
8S3 object lockingS3 Object Lock enables you to store objects using a "Write Once Read Many" (WORM) model. Enable S3 Object Lock to help prevent accidental or inappropriate deletion of data.MinorIn order to enable both Cross-Region data replication and Object lock on a bucket, you will need to contact AWS support. More details here.

Verify Security Checklist

  1. Add an Amazon S3 storage unit as described in Add An Amazon S3 Storage
  2. The security checklist can be enabled either from the storage card, or from the actions dropdown by switching the toggle
  1. Click View checklist to inspect the security checklist
  1. A modal opens that presents the available security checks
  1. Enable security checks by switching the toggle
  1. Click Run the checklist to verify enabled checks
  1. A process will start that verifies all the enabled items, computes a score and sets a last update time
    1. Failed items will show in red and a How to fix link will be available
    2. Passed items will show in dark grey and the score will be updated accordingly
  1. Review the security checklist status in a glance by checking the storage card
  1. The security checklist can be disabled from the actions dropdown, by switching the toggle

How is the score computed?

Each type of check is worth a different number of points, such that, when all enabled and resolved, the total would be 100.

Type of checkPoints per item
Critical15
Major12.5
Minor10

The final score is a combination of the number of enabled and resolved security checks for each type.

Variable nameMeaning
CRNumber of critical items that are resolved
MRNumber of major items that are resolved
mRNumber of minor items that are resolved
CENumber of critical items that are enabled
MENumber of major items that are enabled
mENumber of minor items that are enabled

The score is computed as follows: score = (CR * 15 + MR * 12.5 + mR * 10) / (CE * 15 + ME * 12.5 + mE * 10) * 100

We encourage you to verify the security checklist on demand as often as needed.

In order to run the checklist the following AWS policies are needed:

  • s3:GetBucketPublicAccessBlock
  • s3:GetBucketObjectLockConfiguration
  • s3:GetEncryptionConfiguration
  • s3:GetBucketLogging
  • s3:ListBucket
  • s3:GetBucketVersioning
  • s3:GetBucketAcl
  • s3:GetBucketPolicy
  • s3:GetReplicationConfiguration

If any policies are missing, some checks might be unsuccessful.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard