Amazon GuardDuty Malware Protection for Amazon S3

Amazon S3 → Amazon EventBridge → Amazon GuardDuty → Amazon SNS

Configure Malware Protection for Amazon S3 bucket using Amazon GuardDuty

This pattern demonstrates creating an Amazon S3 Malware Protection plan and integrating the findings with Amazon EventBridge and Amazon SNS to notify users of the scan results.
The AWS SAM template creates an IAM role that includes permissions required for GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. The template also creates an EventBridge managed rule, which is used to route S3 `put-object` and S3 bucket-level event notifications to GuardDuty's S3 Malware Protection Service.
Another EventBridge rule monitors the S3 object scan results and sends notifications to an SNS topic where users can subscribe via email.
This pattern deploys one S3 Bucket, one SNS topic, one SNS subscription, one IAM role, one EventBridge rule, and one Malware protection plan.

< Back to all patterns

GitHub icon Download this pattern (.zip)

GitHub icon View this pattern on GitHub


Clone repo

git clone https://github.com/aws-samples/serverless-patterns/cd serverless-patterns/guardduty-malware-s3

Deploy

sam deploy --guided


Testing

See the GitHub repo for detailed testing instructions.

Cleanup

Delete the stack: sam delete.

Created by:

Sumit Kapoor

Sumit Kapoor

I am currently working as a Lead DevOps Engineer at Clarivate

Follow on LinkedIn