Off-Prem

PaaS + IaaS

Amazon slaps automatic encryption on S3 data

Ensures future security stuffups will take extra effort


Amazon has taken the hint regarding security of its cloud-based Simple Storage Service (S3) and updated it so that all newly added objects are encrypted by default. The move comes after the cloud giant announced new default bucket security settings in December.

S3 – initally known as the Simple Storage Service – was the first service made available when Amazon launched AWS as a public cloud way back in 2006. While the object storage platform has proven popular, Amazon's policy of leaving it up to the user to configure security settings has played its part in a number of data breaches over the years when buckets were unintentionally exposed to the outside world.

As of January 5, the S3 platform now encrypts all new objects added to buckets by default, applying server-side encryption (SSE-S3) using 256-bit AES for each new object, unless the user specifies a different encryption option. This change is effective now across all AWS Regions.

SSE-S3 has actually been supported for a long time, as Amazon says in its blog, but it was previously left up to the user to enable it. "This change puts another security best practice into effect automatically – with no impact on performance and no action required on your side," wrote Amazon's Sébastien Stormacq.

While it was simple to enable, the opt-in nature of SSE-S3 meant that users had to ensure it was always configured on new buckets and verify that it remained properly configured over time, according to Amazon. For organizations that require all their objects to remain encrypted at rest with SSE-S3, the latest update helps them meet encryption compliance requirements without any additional tools or configuration changes.

Alternatively, customers can update this default configuration using their own encryption keys (SSE-C) or by using AWS Key Management Service keys (SSE-KMS).

Somewhat confusingly, AWS already supported a feature called S3 Default Encryption as a bucket-level setting which customers could use to specify a default encryption level. Existing buckets already using this feature will not change, Amazon said, but the setting can no longer be disabled to ensure that all new data uploaded to S3 will be encrypted at rest.

AWS strains to make Simple Storage Service not so simple to screw up

READ MORE

The change to automatic encryption for new object uploads and S3 Default Encryption configuration is visible now in AWS CloudTrail logs, according to Amazon.

Over the next few weeks, this status will also begin to appear in the S3 management console, S3 Inventory, S3 Storage Lens, and as an additional S3 API header in the AWS CLI and AWS SDK.

The default bucket security settings announced in December will not take effect until April. One of the changes blocks public access to newly created buckets by default to guard against users unintentionally creating an openly available bucket, as The Register detailed at the time. ®

Send us news
15 Comments

Now AWS gets a ChatGPT-style Copilot: Amazon Q to be your cloud chat assistant

Anthropic CEO also rocks up on stage for reasons

The AI everything show continues at AWS: Generate SQL from text, vector search, and more

Invisible watermarks on AI-generated images? Sure. But major tools in the stack matter most

Watchdog claims retaliation from military after questioning cushy federal IT contracts

IT-AAC had a hand in scrutinizing JEDI, now faces probe for challenging $300M+ single-source deals

AWS previews AppFabric for productivity – pitched as AI-powered glue between apps

Park user data in Amazon's servers for ML-generated insights and actions – yea or nay for you?

You're so worried about AWS reliability, the cloud giant now lets you simulate major outages

Fake it 'til you break it, for a whole availability zone or WAN FAIL

AWS rakes in half a billion pounds from UK Home Office

Someone has to top up the Bezos rocket fund, like British taxpayers

AWS exec: 'Our understanding of open source has started to change'

Apache Foundation president David Nalley on Amazon Linux 2023, Free software, and more

Rackspace runs short of Cloud Files storage in LON region

Rackspace? More like Lackspace as customers face upload and delete problems

AWS unveils core-packed Graviton4 and beefier Trainium accelerators for AI

Also hedging its bets with a healthy dose of Nvidia chips too

AWS plays with Fire TV Cube, turns it into a thin client for cloudy desktops

$195 a pop, delivered, pre-provisioned ready to stream desktops or apps

AWS accuses Microsoft of clipping customers' cloud freedoms

World's biggest off-prem service slinger submits comments to UK cloud inquiry, mostly has Redmond HQ's rival in its sights

Google releases fix for missing Drive for desktop files

Just install the latest client and follow the instructions, but don't ask questions