Antivirus for S3 Buckets
Many of our AWS consultancy clients ask me:
“How can we make sure that the files that we store on S3 are virus free?”
As always, our clients are looking for simple and cheap solutions. That’s why we developed Antivirus for Amazon S3. Every file that is added to an S3 bucket is automatically scanned.
- Uses ClamAV to scan newly added files on S3 buckets
- Updates ClamAV database every 3 hours automatically
- Scales EC2 instance workers to distribute the workload
- Publishes a message to SNS in case of a finding
- Can optionally delete compromised files automatically
- Logs to CloudWatch Logs
- Reporting capabilities
- Scan buckets at regular intervals / initial bucket scan
- Quarantine infected files
- Enhanced security features (e.g., IMDSv2)
- Regular Security updates
- Multi-Account support
- AWS Integrations:
- CloudWatch Integration (Metrics and Dashboard)
- Security Hub Integration
- SSM OpsCenter Integration
- S3 -> SNS fan-out support
A picture is worth a thousand words:
Protect your S3 buckets!
Follow four simple rules to avoid data leaking from S3. Download our S3 Security Guide!
- A SQS queue is used to decouple scan jobs from the ClamAV workers. Each S3 bucket can fire events to that SQS queue in case of new objects. This feature of S3 is called S3 Event Notifications.
- The SQS queue is consumed by a fleet of EC2 instances running in an Auto Scaling Group. If the number of outstanding scan jobs reaches a threshold a new ClamAV worker is automatically added. If the queue is mostly empty workers are removed.
- The ClamAV workers run a simple ruby script that executes the clamscan command. In the background the virus db is updated every three hours.
clamscanfinds a virus the file is directly deleted (you can configure that) and a SNS notification is published.
Visit the template’s repository for installation instructions: aws-s3-virusscan