Troubleshooting S3 object post-scan tag failures in Malware Protection for S3 - Amazon GuardDuty

Troubleshooting S3 object post-scan tag failures in Malware Protection for S3

This section applies to you only if you Enable tagging for scanned objects in your protected bucket.

When GuardDuty attempts to add a tag to your scanned S3 object, the action of tagging may result in a failure. The potential reasons why this may happen to your bucket are ACCESS_DENIED and MAX_TAG_LIMIT_EXCEEDED. Use the following topics to understand the potential reasons for these post-scan tag failure reasons and troubleshoot them.

ACCESS_DENIED

The following list provides potential reasons that may cause this issue:

  • The IAM role used for this protected S3 bucket is missing the AllowPostScanTag permission. Verify that the associated IAM role uses this bucket policy. For more information, see Create or update IAM role policy.

  • The protected S3 bucket policy does't allow GuardDuty to add tags to this object.

  • The scanned S3 object no longer exists.

MAX_TAG_LIMIT_EXCEEDED

By default, you can associate up to 10 tags with an S3 object. For more information, see Considerations for GuardDuty to add a tag to your S3 object under Enable tagging for scanned objects.