- AWS re:Post questions for Amazon Macie
- Amazon Macie FAQs
- Free Cybersecurity Training
- Amazon Macie Pricing
- Amazon Macie Blogs
-
Monitoring and processing findings
-
EventBridge
- Reoirt to Jira or Slack
- Tags buckets as "sensitive"
- Visualize findings with Amazon QuickSight
- Take action using AWS Step Functions
- etc.
- Security Hub
- Amazon Partner Network
-
Macie onboarding
- Enable Macie on all accounts
- Evaluate bucket security posture
- Run inspection jobs on data sets
-
Centrally manage multiple Macie accounts
- AWS Organizations
- Membership invitations
-
Additional considerations
- Allowing Macie to access
buckets and objects
- Supported file and storage formats
- Encrypted objects
- Long term storage of results
- Forecasting and monitoring costs
-
Security in Amazon Macie
- Data protection
- Identity and access management
- Logging and monitoring
- Compliance validation
- Resilience
- Infrastructure security
- VPC endpoints (AWS PrivateLink)
-
Sensitive Data Discovery jobs
-
Automate the discovery of sensitive data
- Continuous
- On-demand
- Control breadth/depth/exclude
-
Discover a variety of sensitive data types
- Managed data identifiers
(credentials, financial, PHI, PII)
- Custom data identifiers
-
Scan Job configuration
-
S3 bucket components
-
Gathering metadata and calculating statistics
- General information about bucket (name, ARN, etc.)
- Account-level permissions settings that apply to the bucket
- Bucket-level permissions settings for the bucket
- Shared access and replication settings for the bucket
- Object counts and settings for objects in the bucket
-
Monitoring bucket security and privacy
- Account-level events
- Bucket-level events
-
Evaluating bucket security and access control
- Zelkova
-
Scope for sensitive data
discovery jobs
-
S3 buckets
- Preview the criteria results
- Include existing S3 objects
- Sampling depth (% of objects)
-
S3 object criteria (include/exclude)
- Last modified
- Prefix
- Storage size
- Tags
-
Data security configuration
& policies checking
- Know if your buckets are encrypted
- Know if your buckets are open to the world (Public read and/or write)
- Know if your buckets are being shared outside your Org
-
Evaluate and monitor data for security and access control
-
Dashboard
- Policy findings
-
Sensitive data findings
- Statistics
- Suppressing findings
- S3 bucket inventory