{"id":42682,"date":"2021-05-24T00:00:00","date_gmt":"2021-05-24T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/e\/improve-amazon-aws-3-buckets-security.html"},"modified":"2021-05-24T00:00:00","modified_gmt":"2021-05-24T00:00:00","slug":"how-to-improve-security-for-amazon-s3-buckets-computer-engineer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/","title":{"rendered":"How to improve security for Amazon S3 buckets Computer Engineer"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/e\/how-to-improve-security-for-amazon-s3-buckets\/how-to-improve-security-for-amazon-s3-buckets.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/21\/e\/how-to-improve-security-for-amazon-s3-buckets\/how-to-improve-security-for-amazon-s3-buckets.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div readability=\"39.933926302414\">\n<div readability=\"25.636594663278\">\n<p><b><span class=\"body-subhead-title\">Overview<\/span><\/b><\/p>\n<p>Since 2006, Amazon Web Services (AWS) has provided object storage to make web-scale computing easier. This service enables organizations of any size or industry to store large troves of data for websites, mobile applications, disaster recovery, and whatever else the business requires.<\/p>\n<p>Recently, <a href=\"https:\/\/www.securitymagazine.com\/articles\/94886-hobby-lobby-exposes-of-138gb-of-customer-and-payment-data\" target=\"_blank\" rel=\"noopener\">Hobby Lobby<\/a>, a prolific American arts and crafts enterprise had 138GB of data, including payment card info and physical addresses, plucked out of an open Amazon S3 bucket. Events like this impact the entire organization\u2014including developers, who are responsible for remediating misconfigurations.<\/p>\n<p>This article explores how to avoid post-deployment headaches by increasing the security of your Amazon S3 buckets and the objects stored within during the early phases of development.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"37.008608321377\">\n<div readability=\"21.147776183644\">\n<p><b>The shared responsibility model<\/b><\/p>\n<p>As with all cloud environments, you\u2019re responsible for what you&nbsp;<b>store<\/b>&nbsp;in it. This is part of the&nbsp;<a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\">shared responsibility model<\/a>\u2014meaning that the cloud service provider (CSP) is responsible for the overall security of the infrastructure that runs all of the services, but the user is responsible for securing any data or objects within that environment.<\/p>\n<p>Seems a little vague, right? The level of responsibility assigned to customers and CSPs based on the type of cloud service being consumed across software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). Here\u2019s an example of the shared responsibility model for AWS:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"51.302127659574\">\n<div readability=\"48.342389525368\">\n<p>As a user of Amazon S3, it is your responsibility to consider the following security requirements:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Define the least privileged access to the bucket and continuously review those permissions across all the buckets<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enable encryption<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enable data recovery to help meet compliance requirements<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enable protection of overwritten objects<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Define tags for better labeling, collecting, and organizing resources available within your AWS environment<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Enable \u201cBlock Public Access\u201d for buckets that should never be public<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Ensure Amazon S3 buckets are enforcing secure sockets layer (SSL) to secure data in transit<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Ensure the logging access is enabled to track access requests<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Validate that the information being stored is safe and does not contain malicious code hidden as malware or ransomware<\/span><\/li>\n<\/ul>\n<p>You may have a couple of questions: How do you audit and validate that these security policies and controls are implemented across all your Amazon S3 buckets? Do users have visibility of any changes that might occur within this and other cloud services that would indicate a policy and\/or compliance violation? How can you remediate a violation without disrupting your workflow? How do you integrate an extra layer of security to scan for malicious content coming into your Amazon S3 bucket?<\/p>\n<p>These are great questions to ask, and we have some insights for you. Let\u2019s dive into some tools and solutions that can provide you with maximum visibility into your cloud risk posture as well as remediation advice.<\/p>\n<p><b><span class=\"body-subhead-title\">What\u2019s \u201cshift left\u201d?<\/span><\/b><\/p>\n<p>All of our suggestions enable your security approach to \u201cshift left.\u201d Essentially, this means moving your security scans, audits, or thingamajigs to the front of your pipeline. The benefits of catching security issues at the onset are huge: it helps save time, money, and it reduces risks to the business. By introducing security checks and validation at the first step in the infrastructure build process (IaC templates), you can reduce friction for the development and operations team\u2014who doesn\u2019t want that?!<\/p>\n<p>This all sounds great in theory, but you may be wondering what <i>exactly<\/i> are you looking for, or what <i>should<\/i> you be keeping an eye on? <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/c\/misconfigurations-avoid-the-risk.html\" target=\"_self\" rel=\"noopener\">Misconfigurations are the number one risk<\/a> to cloud environments. Therefore, you should pay extra attention to monitoring for any possible errors.<\/p>\n<p>This may sound like a lot of work that eats time from building, but there\u2019s cloud security posture management (CSPM) tools that can help monitor for misconfigurations in real-time across all your Amazon S3 buckets and other AWS services. It\u2019s ideal that the CSPM you choose embraces the \u201cshift-left\u201d security approach by integrating into the infrastructure as code (IaC) with AWS CloudFormation templates. This will allow you to identify and detect any possible misconfigurations in the earliest stage of development.<\/p>\n<p>Okay, now to the good stuff\u2014here\u2019s how a CSPM tool such as Trend Micro Cloud One\u2122 can help you shift-left and effectively secure your Amazon S3 buckets so it\u2019s smooth sailing from build time to run time.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"36.371270718232\">\n<div readability=\"21.449723756906\">\n<p><i>FYI\u2014If you are interested in creating your environment, here is a Git repository with CloudFormation to automate this process for you:&nbsp;<\/i><a href=\"https:\/\/github.com\/fernandostc\/AWS_IaC_pipeline_with_Security\" target=\"_blank\" rel=\"noopener\"><i>https:\/\/github.com\/fernandostc\/AWS_IaC_pipeline_with_Security<\/i><\/a><i><\/i><\/p>\n<p><b><span class=\"body-subhead-title\">Integrated Development Environment (IDE) security plugin<\/span><\/b><\/p>\n<p>You can streamline the entire audit process by choosing a CSPM that uses an IDE security plug-in. This is designed to quickly get real-time feedback for developers in the IaC template, so they can scan and fix issues in their current IDE workspace as early as possible. By doing so, developers can prevent misconfigurations across different AWS services and build in accordance with the AWS Well-Architected Framework.<\/p>\n<p>Below is an example of a template scanning report generated by a security plugin, which shows potential risks found in your pipeline. This helps you identify what needs to be fixed before you start building with it in production.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"41.261924009701\">\n<div readability=\"29.74696847211\">\n<p>Link to VSCode plugin:&nbsp;<a href=\"https:\/\/marketplace.visualstudio.com\/items?itemName=raphaelbottino.cc-template-scanner\" target=\"_blank\" rel=\"noopener\">Cloud Conformity Template Scanner Extension<\/a><\/p>\n<p><b><span class=\"body-subhead-title\">How do template scanners work?<\/span><\/b><\/p>\n<p>Think of template scanning as body scanners at the airport\u2014it\u2019s similar in the way it provides enhanced visibility into any risks or threats that may not be caught with the human eye. Template scanning is especially necessary if you use open source code repositories to build (which 90% of developers do, according to<a href=\"https:\/\/www.gartner.com\/en\/documents\/3971011\/technology-insight-for-software-composition-analysis\" target=\"_blank\" rel=\"noopener\"> Gartner<\/a>).<\/p>\n<p>Template scanners use powerful APIs within your CSPM tool to provide automated, real-time checks every time you push a new template. It also shares the results with developers and cloud architects, so they can investigate any potential issues before production. Auto-remediation allows you to continue building at lightning speed. For example, you can configure settings so that if the scan finds an \u201cExtreme\u201d or \u201cHigh-risk\u201d issue for example, the CSPM will stop the deployment of the new infrastructure and notify the development team through Slack, Jira, ServiceNow, PagerDuty, and other third-party notification tools.<\/p>\n<p>The example below shows how you can detect any misconfiguration on Amazon S3 buckets during the CI\/CD pipeline before you build the CloudFormation template in your AWS account:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"37.40206185567\">\n<div readability=\"23.376288659794\">\n<p><b><span class=\"body-subhead-title\">Introducing Trend Micro Cloud One\u2122 \u2013 Conformity<\/span><\/b><\/p>\n<p>As part of the <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html\">Trend Micro Cloud One\u2122<\/a> platform, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-conformity.html\">Trend Micro Cloud One\u2122 \u2013 Conformity<\/a> is a CSPM solution that seamlessly integrates into your CI\/CD pipeline to detect misconfiguration in multiple CSPs. It\u2019s designed to overcome any visibility or security risk challenges by running auto-checks against hundreds of cloud infrastructure configuration best practices and compliance standards including PCI-DSS, HIPAA, HITRUST, NIST-800-53, and more. The solution also ensures fast remediation by providing instant alerts and remediation steps when critical misconfigurations are detected.<\/p>\n<p>With Conformity, organizations receive a comprehensive picture of security and compliance risks across all cloud environments. Below is an example of the insight Conformity provides your Amazon S3 buckets after checking them against the AWS Well-Architected Framework, compliance standards, and other best practice guidelines.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"34.870266479663\">\n<div readability=\"18.59747545582\">\n<p><b><span class=\"body-subhead-title\">Reminder: Double-check what\u2019s going in your Amazon S3 buckets<\/span><\/b><\/p>\n<p>But wait\u2014there\u2019s more! As we mentioned earlier, it\u2019s critical to scan what is going into your bucket as well. By scanning any file before its uploaded, you can prevent malware from entering your organization and impacting downstream workflows or infecting external web applications.<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/cloud-one-file-storage-security.html\" target=\"_blank\" rel=\"noopener\">Trend Micro Cloud One\u2122 \u2013 File Storage Security<\/a> complements Conformity by making sure the files going inside the bucket are safe as well as helping you stay compliant by keeping your files and data within your AWS account during scanning.<\/p>\n<p>Below is a diagram showing the journey of a file through File Storage Security before receiving the stamp of approval.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"33.5\">\n<div readability=\"12\">\n<p>Next, it\u2019s important to have a post-scan game plan for flagged files. By setting up post-scan actions, File Storage Security will automate the incident and response use cases for possible malicious objects. Post-scan actions can include quarantining the file in your account but away from your application or terminating the file outright. Here is an example of scan results of a file\u2014the \u201cmalicious\u201d tag will trigger the appropriate post-scan action.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"32\">\n<div readability=\"9\">\n<p>You also have centralized visibility about the number of objects you have scanned and how many those files have been recognized as malicious. Here is an example of such on the dashboard in Trend Micro Cloud One:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"38.09845890411\">\n<div readability=\"22.468321917808\">\n<p>By automating the file scanning process, you\u2019re eliminating the possibility of human interaction which in return increases the level of security and compliance within your Amazon S3 buckets. Some other benefits of File Storage Security are:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Improve file reputation: Block bad files using Trend Micro anti-malware signatures on all types of malware, including viruses, Trojan, spyware, and more<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Variant protection: Look out for obfuscated or polymorphic variants of malware via fragments of previously seen malware and detection algorithms<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Extensive flexibility: Trusted scanning support for all file sizes and types, including .BIN, .EXE, .JPEG, .MP4, .PDF, .TXT, .ZIP, and more<\/span><\/li>\n<\/ul>\n<p><b><span class=\"body-subhead-title\">Demo: Happy Path<\/span><\/b><\/p>\n<p>In this real-life example, we\u2019ll put all the pieces together and show you how Conformity and File Storage Security can apply to your web applications using AWS services.<\/p>\n<p><a href=\"https:\/\/aws.amazon.com\/blogs\/compute\/author\/jbeswick\/\" target=\"_blank\" rel=\"noopener\">James Beswick<\/a>, principal developer advocate for the AWS Serverless Team, demonstrated how to create a new web application called <a href=\"https:\/\/aws.amazon.com\/blogs\/compute\/using-serverless-backends-to-iterate-quickly-on-web-apps-part-1\/\" target=\"_blank\" rel=\"noopener\">Happy Path<\/a> using AWS Lambda, Amazon S3 buckets, AWS Step Functions, and other AWS services. &nbsp;Check out the backend architecture below or view the Git repository <a href=\"https:\/\/github.com\/aws-samples\/happy-path\" target=\"_blank\" rel=\"noopener\">here<\/a>.&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"28.109777015437\">\n<div readability=\"10.747855917667\">\n<p>Source:&nbsp;<a href=\"https:\/\/aws.amazon.com\/blogs\/compute\/using-serverless-backends-to-iterate-quickly-on-web-apps-part-2\/\" target=\"_blank\" rel=\"noopener\">https:\/\/aws.amazon.com\/blogs\/compute\/using-serverless-backends-to-iterate-quickly-on-web-apps-part-2\/<\/a><\/p>\n<p>Imagine you have a fully automated IaC pipeline to build the Happy Path architecture and want to ensure its as secure as possible before its deployed. You can improve this environment by integrating Conformity (CSPM with IDE plugin) to check how it stacks up against the AWS Well-Architected Framework and if its meeting compliance. This will give you real-time feedback about any possible updates or improvements you can implement on your cloud infrastructure. See below:<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"39.5\">\n<div readability=\"24\">\n<p>To take Happy Path to the next level security-wise, you need to integrate additional protection for the files being uploaded into the Amazon S3 bucket. Unlike other AWS services, Trend Micro Cloud One solutions, Conformity and File Storage Security, detect misconfigurations of the Amazon S3 buckets, <i>and<\/i> the files uploaded within it before an event is triggered by Lambda. This is important because if the file is unscanned before moved elsewhere by a Lambda function, it could spread malicious malware throughout your entire infrastructure.<\/p>\n<p>The grey box in the diagram below demonstrates where you could integrate File Storage Security so that any new object is automatically scanned and if tagged as malicious (or your tag of choice) will be moved to a quarantine bucket. Alternatively, if the file is determined to be safe, it will move to a promote bucket. By integrating File Storage Security into the Happy Path architecture, you can ensure that your application is processing safe documents and objects before they\u2019re shared with your customer or partners.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"39.049429657795\">\n<div class=\"responsive-table-wrap\" readability=\"23.726235741445\">\n<p><b><span class=\"body-subhead-title\">Conclusion<\/span><\/b><\/p>\n<p>In order to build securely, you must consider the AWS shared responsibility model, so you can be fully aware of your security responsibilities for each AWS service. Knowing what role you play and choosing the appropriate CSPM vendor allows you to get the best out of all the AWS-native services that integrate smoothly within your architecture.<\/p>\n<p>As the gatekeeper of what goes in and out of your buckets, it\u2019s ideal to implement real-time scans to inspect those buckets for malware and misconfigurations so they\u2019re detected before they can impact business processes. The advanced capabilities of Conformity and File Storage Security automatically identify and eliminate malicious content and enable you to plug configurations that may grant too much access. This is key to reduce disruptions and prevent criminal activity\u2014which, just like a data leak, can have critical consequences for the business.<\/p>\n<p>Get started with a free <a href=\"https:\/\/cloudone.trendmicro.com\/SignUp.screen\"><u>30-day trial<\/u><\/a> or check out our additional resources below.<\/p>\n<p><b><span class=\"body-subhead-title\">Security Best Practices and Guidelines for Amazon S3:<\/span><\/b><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div readability=\"31\">\n<div class=\"responsive-table-wrap\" readability=\"7\">\n<p><b><span class=\"body-subhead-title\">A Guide to Protecting Object Storage Workflows with File Storage Security:<\/span><\/b><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/21\/e\/improve-amazon-aws-3-buckets-security.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avoid post-deployment headaches by increasing the security of your Amazon S3 buckets and the objects stored within during the early phases of development. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42683,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9503,9505,9501,9571],"class_list":["post-42682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-article","tag-trend-micro-devops-aws","tag-trend-micro-devops-cloud-native","tag-trend-micro-devops-how-to"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How to improve security for Amazon S3 buckets Computer Engineer\",\"datePublished\":\"2021-05-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\"},\"wordCount\":2040,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg\",\"keywords\":[\"Trend Micro DevOps : Article\",\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Cloud Native\",\"Trend Micro DevOps : How To\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\",\"name\":\"How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg\",\"datePublished\":\"2021-05-24T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : Article\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to improve security for Amazon S3 buckets Computer Engineer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/","og_locale":"en_US","og_type":"article","og_title":"How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-24T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How to improve security for Amazon S3 buckets Computer Engineer","datePublished":"2021-05-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/"},"wordCount":2040,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg","keywords":["Trend Micro DevOps : Article","Trend Micro DevOps : AWS","Trend Micro DevOps : Cloud Native","Trend Micro DevOps : How To"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/","url":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/","name":"How to improve security for Amazon S3 buckets Computer Engineer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg","datePublished":"2021-05-24T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-to-improve-security-for-amazon-s3-buckets-computer-engineer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : Article","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-article\/"},{"@type":"ListItem","position":3,"name":"How to improve security for Amazon S3 buckets Computer Engineer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42682"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42682\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42683"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}