TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

AWS S3 beginning to apply 2 security best practices all new buckets by default

54 pointsby nixcraftabout 2 years ago

7 comments

leetroutabout 2 years ago
They also default to encrypting objects now.<p><a href="https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;aws&#x2F;amazon-s3-encrypts-new-objects-by-default&#x2F;" rel="nofollow">https:&#x2F;&#x2F;aws.amazon.com&#x2F;blogs&#x2F;aws&#x2F;amazon-s3-encrypts-new-obje...</a>
评论 #35506393 未加载
nutbearabout 2 years ago
I wrote a blog detailing what this change means on S3 ACLs and Block Public Access on by default: <a href="https:&#x2F;&#x2F;www.cloudquery.io&#x2F;blog&#x2F;finding-enabled-s3-acls-and-disabled-s3-block-public-access" rel="nofollow">https:&#x2F;&#x2F;www.cloudquery.io&#x2F;blog&#x2F;finding-enabled-s3-acls-and-d...</a>
rcmeabout 2 years ago
What is the alternative to ACLs? Or is reading from users &#x2F; roles in the same project supported by default, provided the user &#x2F; role has the required permissions?
评论 #35504180 未加载
ed25519FUUUabout 2 years ago
Thankfully I’ve never been charged with keeping any serious PII in an S3 bucket, because the permissions have always worried me, and I’d probably be considered an expert with IAM policies.<p>Thankfully with S3 it’s getting easier and easier to do the right thing. I’m glad for the S3 team moving in this direction.
hdjjhhvvhgaabout 2 years ago
What is funny is that although they have been phasing out S3 ACLs for years, they are still using it for their own products. For example, Control Tower uses S3 ACLs to secure access to S3 buckets with logs.
based2about 2 years ago
competition on SAML authn:<p>* <a href="https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;azure&#x2F;active-directory&#x2F;manage-apps&#x2F;howto-enforce-signed-saml-authentication" rel="nofollow">https:&#x2F;&#x2F;learn.microsoft.com&#x2F;en-us&#x2F;azure&#x2F;active-directory&#x2F;man...</a><p>* <a href="https:&#x2F;&#x2F;www.alibabacloud.com&#x2F;help&#x2F;en&#x2F;resource-access-management&#x2F;latest&#x2F;saml-response-for-role-based-sso" rel="nofollow">https:&#x2F;&#x2F;www.alibabacloud.com&#x2F;help&#x2F;en&#x2F;resource-access-managem...</a>
drewdaabout 2 years ago
Given how many major data breaches have been the result of unintentional public access to orgaanizations&#x27; data on S3, I almost think Amazon should remove all public access to buckets and objects from the entire S3 product.<p>Instead make all access to S3 be through credentialed access or signed URLs. If users need to expose an entire bucket to the public Internet, make them go to the effort to put a service in front of the bucket.<p>Yes, this would be a huge change. But playing with the default values for S3 seems like too little, too late.
评论 #35504191 未加载
评论 #35504156 未加载
评论 #35504114 未加载
评论 #35504557 未加载
评论 #35504520 未加载
评论 #35505425 未加载
评论 #35504882 未加载
评论 #35504183 未加载