Usecase Universe

A collective of use cases for DevOps teams

Browse a variety of 200+ predefined templates to automate all your AWS actions

S3

24 Times Used
22 MAY 2019
S3 Bucket Public 'FULL_CONTROL' Access

Sends a report of all S3 Buckets with Public 'FULL_CONTROL' Access. Allowing this access is dangerous as unauthorised users can view, delete, edit and add objects in your S3 Buckets.

S3 Bucket Logging Enabled

Sends a report of S3 Buckets without Bucket logging enabled. The logs enable you to track the request made to access the Buckets and use this data to protect against unauthorised access.

S3 Bucket Public 'WRITE_ACP' Access

Sends a report of all S3 Buckets with Public 'WRITE_ACP' Access. Providing this access allows unauthorised users to edit who has control over your objects, thereby allowing them to delete, edit and add objects in S3 Buckets.

S3 Bucket Public 'WRITE' Access

Sends a report of all S3 Buckets that provide Public 'WRITE' Access. Providing this access will allow unauthorised users the ability to delete, change and add objects in your S3 Buckets.

S3 Bucket Public 'READ_ACP' Access

Sends a report of all S3 Buckets with Public 'READ_ACP' Access. Providing this access allows unauthorised users to view who has control over your objects, and find those with badly configured permissions.

S3 Bucket Public 'READ' Access

Sends a report of S3 Buckets that have allowed Public READ Access. Providing such access is a security vulnerability, and allows unauthorised users to list all the objects in your bucket.

CloudTrail S3 Bucket Logging Enabled

Sends a report of CloudTrail Trails whose S3 bucket does not have "Bucket Logging" enabled. With Server Access Logging feature enabled for your S3 buckets you can track any requests made to access the buckets and use the log data to take measures in order to protect them against unauthorized user access.

CloudTrail S3 Bucket Publicly Accessible

Sends a report of CloudTrail Trails present in your AWS account whose S3 bucket is publicly accessible. Using Public S3 bucket makes your log files less secure and easily accessible for others

S3 Bucket Policy Change Events

Send report of all the S3 bucket policy changes in your AWS account i.e. if any operations like put/delete bucket policy is performed in your AWS account then this workflow will generate a report of it and send it to your email.

Copy EC2 Logs Data to S3 and Delete the Log Folder

Moves the logs present in the log folder of EC2 machine and transfers them into a specified S3 Bucket. This practice helps you to store the logs you want, without worrying about the disk space in the machine.

S3 Bucket Public Access Via Policy

This workflow reports the public S3 buckets in the AWS account. It gives an overview of public buckets which helps in making sure no customer data is exposed.

DynamoDB to S3 Exporter

Exporting data from dynamoDB to S3 is one of the best AWS backup strategies and successfully safeguards your data. In cases of accidental deletion of data, you can restore the data from a previous export file in Amazon S3. You can even copy data from a DynamoDB table in one AWS region, store the data in Amazon S3, and then import the data from Amazon S3 to an identical DynamoDB table in a second region.