1. AWS re:Post questions for Amazon Macie
  2. Amazon Macie FAQs
  3. Free Cybersecurity Training
  4. Amazon Macie Pricing
  5. Amazon Macie Blogs
  6. Monitoring and processing findings
    1. EventBridge
      1. Reoirt to Jira or Slack
      2. Tags buckets as "sensitive"
      3. Visualize findings with Amazon QuickSight
      4. Take action using AWS Step Functions
      5. etc.
    2. Security Hub
    3. Amazon Partner Network
  7. Macie onboarding
    1. Enable Macie on all accounts
    2. Evaluate bucket security posture
    3. Run inspection jobs on data sets
    4. Centrally manage multiple Macie accounts
      1. AWS Organizations
      2. Membership invitations
  8. Additional considerations
    1. Allowing Macie to access buckets and objects
    2. Supported file and storage formats
    3. Encrypted objects
    4. Long term storage of results
    5. Forecasting and monitoring costs
    6. Security in Amazon Macie
      1. Data protection
      2. Identity and access management
      3. Logging and monitoring
      4. Compliance validation
      5. Resilience
      6. Infrastructure security
      7. VPC endpoints (AWS PrivateLink)
  9. Sensitive Data Discovery jobs
    1. Automate the discovery of sensitive data
      1. Continuous
      2. On-demand
      3. Control breadth/depth/exclude
    2. Discover a variety of sensitive data types
      1. Managed data identifiers (credentials, financial, PHI, PII)
      2. Custom data identifiers
    3. Scan Job configuration
      1. S3 bucket components
        1. Gathering metadata and calculating statistics
          1. General information about bucket (name, ARN, etc.)
          2. Account-level permissions settings that apply to the bucket
          3. Bucket-level permissions settings for the bucket
          4. Shared access and replication settings for the bucket
          5. Object counts and settings for objects in the bucket
        2. Monitoring bucket security and privacy
          1. Account-level events
          2. Bucket-level events
        3. Evaluating bucket security and access control
          1. Zelkova
      2. Scope for sensitive data discovery jobs
        1. S3 buckets
          1. Preview the criteria results
        2. Include existing S3 objects
        3. Sampling depth (% of objects)
        4. S3 object criteria (include/exclude)
          1. Last modified
          2. Prefix
          3. Storage size
          4. Tags
  10. Data security configuration & policies checking
    1. Know if your buckets are encrypted
    2. Know if your buckets are open to the world (Public read and/or write)
    3. Know if your buckets are being shared outside your Org
    4. Evaluate and monitor data for security and access control
      1. Dashboard
        1. Policy findings
        2. Sensitive data findings
          1. Statistics
        3. Suppressing findings
      2. S3 bucket inventory