Many of our AWS consultancy clients ask me:
“How can we make sure that the files that we store on S3 are virus free?”
As always, our clients are looking for simple and cheap solutions. That’s why I developed S3 VirusScan. Every file that is added to an S3 bucket is automatically scanned.
- Uses ClamAV to scan newly added files on S3 buckets
- Updates ClamAV database every 3 hours automatically
- Scales EC2 instance workers to distribute workload
- Publishes a message to SNS in case of a finding
- Can optionally delete compromised files automatically
- Logs to CloudWatch Logs
A picture is worth a thousand words:
- S3 VirusScan uses a SQS queue to decouple scan jobs from the ClamAV workers. Each S3 bucket can fire events to that SQS queue in case of new objects. This feature of S3 is called S3 Event Notifications.
- The SQS queue is consumed by a fleet of EC2 instances running in an Auto Scaling Group. If the number of outstanding scan jobs reaches a treshold a new ClamAV worker is automatically added. If the queue is mostly empty workers are removed.
- The ClamAV workers run a simple ruby script that executes the clamscan command. In the background the virus database is updated every three hours.
clamscanfinds a virus the file is directly deleted (you can configure that) and a SNS notification is published.
Read more about S3 VirusScan and learn how to install and configure our solution in minutes.