


Choosing the correct scanning model for your application workflow can help ensure no disruption in service for your end-user when an infected file is identified.Ĭurrently, two scanning engines are available out of the box: Sophos and ClamAV. In this post, we review API, event, and retro scanning. Antivirus for Amazon S3Īntivirus for Amazon S3 enables users to detect files infected with malware and viruses using a variety of scanning models. We will also review how organizations can use each model for integrating malware and virus scanning into their workflow, and how they can impact application performance and user experience when infected files are discovered.Īdditionally, we’ll cover the optional implementation and use of AWS Lambda, along with stub files, which help prevent disruption to your application workflow and databases when an infected file has been identified and quarantined. Cloud Storage Security, an AWS Partner with the Security Software Competency, provides multiple scan techniques through its security solution, Antivirus for Amazon S3 which is available in AWS Marketplace. In this post, we will discuss how to easily fit cleanliness scanning into any workflow. To minimize negative upstream and downstream risk, organizations should directly scan all objects in their buckets. If a customer, partner, or internal user downloads and opens an infected file, it can cause harm to the recipient’s system, as well as reputational risk, lost customers, and potential lost revenue for the organization that allowed it to be shared. Not only is the organization exposed to the risk of malicious files, the application’s downstream users are also exposed to potential malware infection on their local devices. Oftentimes, the ingested data is coming from third-party sources, which opens the door to potentially malicious files-objects that may be infected with malware, viruses, ransomware, trojan horses, and more.

Because of its flexibility and ease of use, it has become the “center pin” of many applications hosted on Amazon Web Services (AWS).Ī wide range of solutions ingest data, store it in Amazon S3 buckets, and then share it with downstream users. Partner Solutions Architect, ISV Startups – AWSīy Aron Eidelman, Contributing Author – AWSīy Ed Casmer, CTO – Cloud Storage SecurityĪmazon Simple Storage Service (Amazon S3) is a highly scalable object storage service that allows organizations to store and process data.
