Skip to main content

Overview

The Object Storage module provides centralized visibility into all cloud storage buckets discovered across your environments.
It highlights exposure status, ownership gaps, associations, and risk posture — helping teams secure publicly accessible or misconfigured buckets before they become threat vectors.

Object Storage Overview


Key Metrics

  • Total Buckets
    Shows the full count of detected cloud buckets across environments.
  • Exposed Buckets
    Buckets publicly reachable or misconfigured according to adapter data.
  • Tested Buckets
    Buckets processed or scanned by security tools for additional insights.
  • Exposure Repositories
    Number of repositories or linked assets that introduce risk to a bucket.

Bucket Table Details

Each bucket includes enriched metadata to support deeper analysis:
ColumnDescription
Asset ValueBucket name and source details
SourceCloud provider or integration (e.g., OCI, AWS)
Vuln CountTotal vulnerabilities linked to assets inside or referencing this bucket
Auto RiskAutomated risk score based on severity, exposure, and associations
OwnerResponsible user or team (if assigned)
TagsLabels such as ObjectStorage, Internal, or External
AssociationsNumber of assets or systems connected to this bucket
Detected OnFirst and last seen timestamps

Bucket Listing


What You Can Do

  • Identify exposed buckets before they lead to data leakage
  • ** Correlate buckets with applications, repositories, and IPs**
  • Assign owners to ensure accountability
  • Track detection timelines to understand lifecycle and activity
  • Filter by adapters, risk, exposure, or vulnerabilities for fast triage

Example Use Cases

Shadow Bucket Detection

Detect previously unknown buckets created outside governance.

Misconfiguration Review

Quickly identify buckets with open access or weak configuration.

Data Sensitivity Tracking

Map buckets to high-risk repositories or systems storing sensitive data.

Ownership Assignment

Assign responsible teams to each bucket to strengthen accountability.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.