Skip to content

aws-samples/amazon-macie-demo-with-sample-data

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Amazon Macie Demo with Sample Data

The purpose of this repository is to demo how Data Classification and Discovery works in Amazon Macie.

AWS CloudFormation template (macie.yaml) will enable Amazon Macie and copy the fake data created previously in an Amazon S3 Bucket for its further classification. Also there will be a Custom Classifier to detect classified data in Amazon S3 Bucket.

Requirements

  • Amazon Macie should not be enabled in the region you are launching.
  • If Amazon S3 block public access is enabled CloudFormation template will fail as it can't put the policy.

Disclaimer

This will create a public Amazon S3 Bucket such as "macie-data-AccountId-Region" with s3:ListBucket bucket policy on this specific bucket. It will not affect any other buckets in your account however your security team might get an alert, this bucket is put public to demonstrate the capabilities of Amazon Macie.

Architecture

amazon-macie-demo

Launch the AWS CloudFormation Stack

Click on the Launch Stack button below to launch the CloudFormation Stack to set up the Amazon Macie Demo in the region of your preference, by default this demo will be deployed in us-west-2 (Oregon) region.

Launch CFN stack

Provide a stack name eg amazon-macie-demo.

You can launch the same stack using the AWS CLI. Here's an example:

aws cloudformation create-stack --stack-name amazon-macie-demo \
   --template-body file://macie.yaml \
   --capabilities CAPABILITY_IAM

Amazon Macie Findings

All findings for us-west-2 (Oregon) region can be found here. Be aware that there is a Classification Job running and it will take some time to appear under findings page.

Policy Findings to be discovered in this demo - for all Policy Findings please click here.
  • Policy:IAMUser/S3BucketPublic
  • Policy:IAMUser/S3BucketSharedExternally
  • Policy:IAMUser/S3BucketEncryptionDisabled
  • Policy:IAMUser/S3BlockPublicAccessDisabled
Sensitive Data Findings to be discovered in this demo - for all Sensitive Data Findings please click here
  • SensitiveData:S3Object/Personal
  • SensitiveData:S3Object/Credentials
  • SensitiveData:S3Object/CustomIdentifier
  • SensitiveData:S3Object/Financial -> this one will appear if you add some fake CC numbers in data/financial.txt file and create a new Classification Job.

Clean up

After completing your demo, delete AWS CloudFormation Stack using AWS Console or AWS CLI:

aws cloudformation delete-stack --stack-name amazon-macie-demo

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.

About

Deploy Amazon Macie with Sample Data to generate findings.

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages