or the presence of sensitive data in a specific S3 object. Each finding provides a severity rating, information about the affected resource, and additional details, such as when Macie found the issue. Findings are published to the Macie console,AWS Security Hub,...
such as buckets that typically store AWS logging data. Thesensitivity inspection templatespecifies the allow lists, custom data identifiers, and managed data identifiers that you want Macie to use when it analyzes S3 objects. To change these settings, use theClassification ScopeandSensitivity Inspection...
assign to certain types of AWS resources. Each tag consists of a required tag key and an optional tag value. Tags can help you identify, categorize, and manage resources in different ways, such as by purpose, owner, environment, or other criteria. To learn more, seeTagging Macie resources....
Provides information about the status of automated sensitive data discovery for one or more Amazon Macie accounts. PropertyTypeRequiredDescription items Array of type AutomatedDiscoveryAccount False An array of objects, one for each account specified in the request. Each object specifies the AWS account...
Prüft, ob die automatische Erkennung sensibler Daten für Amazon Macie aktiviert ist. Die Regel lautet NON _, COMPLIANT wenn die automatische Erkennung sensibler Daten deaktiviert ist. Die Regel gilt APPLICABLE für Administratorkonten und NOT _ APPLICA
Macie opens the Amazon CloudWatch console and displays a table of log events for the job. Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/. By using the AWS Region selector in the upper-right corner of the page, select the Region in which you ran jobs that you ...
The classification scope specifies S3 buckets that you want to exclude from analyses, such as buckets that typically store AWS logging data. The sensitivity inspection template specifies the allow lists, custom data identifiers, and managed data identifiers that you want Macie to use when it ...