#security (2022-05)
Archive: https://archive.sweetops.com/security/
2022-05-09
![james avatar](https://avatars.slack-edge.com/2018-12-31/513352820609_79a55e5b5c6956f815ff_72.jpg)
does anyone have a preferred solution for scanning user-uploaded files in AWS? edit: virus scanning
![Grummfy avatar](https://secure.gravatar.com/avatar/bd90f5e1e1cde8ab0ace1ff5c715006e.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0021-72.png)
there is some solution in the marketplace for it, but I’m also thinking to it so I’m intrested by your resulats
![james avatar](https://avatars.slack-edge.com/2018-12-31/513352820609_79a55e5b5c6956f815ff_72.jpg)
yeah I turned up this after some brief googling, does anyone have experience with it?
![james avatar](https://avatars.slack-edge.com/2018-12-31/513352820609_79a55e5b5c6956f815ff_72.jpg)
also, we’re using Rails, might be some solution there instead
![Jonathan Le avatar](https://avatars.slack-edge.com/2022-06-30/3743020264469_11185ecccf85573f89bc_72.jpg)
![attachment image](https://bucketav.com/bucketav-og.jpg)
Scan your S3 buckets for viruses, worms, and trojans. bucketAV detects malware in real-time or on-demand.
![yegorski avatar](https://secure.gravatar.com/avatar/dff3fe554c0be542962fa7d83b0d29bc.jpg?s=72&d=https%3A%2F%2Fa.slack-edge.com%2Fdf10d%2Fimg%2Favatars%2Fava_0019-72.png)
Users of our web console are able uploads files which go to S3. Before they land in the bucket we use ClamV in a lambda to scan the file. Here is a guide that looks familiar though it might not be exactly what we did https://aws.amazon.com/blogs/developer/virus-scan-s3-buckets-with-a-serverless-clamav-based-cdk-construct/
![attachment image](https://d2908q01vomqb2.cloudfront.net/0716d9708d321ffb6a00818614779e779925365c/2021/08/23/Virus-scanning-objects-in-S3-with-Serverless-ClamScan.jpg)
Edit: March 10th 2022 – Updated post to use AWS Cloud Development Kit (CDK) v2. Protecting systems from malware is an essential part of a systems protection strategy. It is important to both scan binaries and other files before introducing them into your system boundary and appropriately respond to potential threats in accordance to your […]