π‘οΈ AWS GuardDuty Detector S3 Protection is not enabledπ’
- Contextual name: π‘οΈ Detector S3 Protection is not enabledπ’
- ID:
/ce/ca/aws/guardduty/detector-s3-protection - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- AWS Security Hub: [GuardDuty.10] GuardDuty S3 Protection should be enabled
Descriptionβ
Descriptionβ
This policy identifies AWS GuardDuty Detectors that do not have S3 Protection enabled.
S3 Protection helps detect potential security risks to your data, such as exfiltration or destruction, in Amazon Simple Storage Service (Amazon S3) buckets. GuardDuty monitors AWS CloudTrail S3 data events, including object-level API operations, to identify these risks across all S3 buckets in your account.
Rationaleβ
GuardDuty S3 Protection analyzes AWS CloudTrail S3 data events (e.g.,
GetObject,ListObjects,DeleteObject) to detect suspicious activity targeting your S3 buckets. It can identify threats such as data exfiltration from unusual geolocations, API calls from known malicious IP addresses, or actions performed by compromised credentials.Impactβ
CloudTrail S3 data event analysis is charged per 1 million events per month, is prorated, and is discounted based on volume.
Auditβ
This policy flags an AWS GuardDuty Detector as
INCOMPLIANTif the S3_DATA_EVENTSFeatureis set to DISABLED.
Remediationβ
Remediationβ
Enable S3 Protectionβ
For Multi-Account Environmentsβ
In a multi-account environment, only the delegated GuardDuty administrator account can enable or disable S3 Protection for member accounts. Member accounts cannot modify this configuration directly.
From Command Lineβ
aws guardduty update-member-detectors \
--detector-id {{detector-id}} \
--account-ids {{account-id1}} {{account-id2}} \
--region {{region}} \
--features 'Name=S3_DATA_EVENTS,Status=ENABLED'The delegated administrator can also automatically enable S3 Protection for all and new accounts as they join the organization.
aws guardduty update-organization-configuration \
--detector-id {{detector-id}} \
--region {{region}} \
--features 'Name=S3_DATA_EVENTS,AutoEnable={{NEW | ALL}}'For a Standalone Accountβ
If your account is not associated with a delegated GuardDuty administrator via AWS Organizations, enable S3 Protection directly:
aws guardduty update-detector \
--detector-id {{detector-id}} \
... [see more](remediation.md)