Amazon S3 Weekly — 2026-04, Week 16

Editor’s Note

This week’s material highlites the architectural patterns emerging around AI workloads built on AWS infrastructure and warns about the operational consequences of misconfigured object storage permissions.


Security and Compliance

A community disclosure involving Fiverr and its Cloudinary-based file storage illustrates a failure mode that surfaces repeatedly across organizations using managed object storage: sensitive documents — in this case materials containing personally identifiable information, including tax forms exchanged between clients and workers — were served via non-signed, publicly accessible URLs rather than time-limited signed ones. The practical consequence was that Google’s crawlers indexed the content, making it retrievable through ordinary search queries.

The reporter noted that 40 days passed without a substantive response from Fiverr’s security contact, and characterized the configuration as a probable violation of the GLBA FTC Safeguards Rule. Whether or not that specific regulatory framing holds, the underlying architectural point is clear: any storage bucket or CDN-backed object repository that handles regulated documents must enforce access at the URL layer, not only at the bucket policy layer. Non-signed URLs offer no expiry, no per-requester scoping, and no audit trail. Teams that treat signed URL generation as an optional hardening step rather than a baseline requirement for user-facing document storage are accepting a class of exposure that does not require a credential breach to materialize — misconfiguration alone is sufficient.


Worth Reading