Amazon Macie: A Comprehensive Solution for Data Security and Privacy
Posted on September 10, 2025 • 8 min read • 1,654 wordsDiscover how Amazon Macie enables technical teams to detect, classify, and protect sensitive data in Amazon S3.

Amazon Macie is a fully managed data security service provided by AWS. It uses machine learning and pattern matching to automatically discover, classify, and protect sensitive data stored in Amazon S3. It provides risk visibility, generates findings when security or privacy issues are detected, and automates protective actions. A 30-day free trial is included for automated S3 bucket evaluation and data scanning.
Macie maintains an inventory of general-purpose S3 buckets and evaluates their security and access configuration daily. It selects a representative sample of objects to scan, based on factors like bucket name, file extension, last modified date, and prioritizes new or recently updated objects.
You can launch sensitive data discovery jobs, either one-time or scheduled (daily, weekly, monthly), targeting specific buckets or objects with managed or custom criteria.
Macie calculates a sensitivity score for each bucket, based on the amount of sensitive data found versus total data scanned. It also assigns a qualitative label (Sensitive, Not sensitive, Not yet analyzed). This score updates automatically as objects are added, deleted, or changed.
Amazon Macie supports over 100 Managed Data Identifiers, enabling it to detect various types of sensitive data stored in S3. These identifiers are grouped into several key categories:
These are data types that can identify a person directly or indirectly:
Sensitive data in a healthcare or insurance context, often subject to HIPAA compliance:
Relevant to PCI-DSS compliance:
Macie detects sensitive credentials and tokens:
Macie supports various country-specific identifiers:
| Country | Detected Identifiers |
|---|---|
| France | Social Security Number (NIR), IBAN |
| Canada | NAS, Driverβs license |
| United Kingdom | NINO, Passport number |
| Germany | Steuer-ID, IBAN |
| Japan | My Number |
| Brazil | CPF, CNPJ |
Tip: Use Custom Data Identifiers to detect internal formats such as customer IDs, project codes, or proprietary tags.
π Full List of Managed Data Identifiers β AWS Documentation
Macie produces two main types of findings:
Each finding includes practical metadata: tags, encryption status, access level, sample content info, and is retained for 30 days via console or API.
All Macie functionalities are available via AWS Console, REST API, CLI, and SDKs (Python, Java, Go, .NETβ¦). This is ideal for automating Macie setup, scanning jobs, or integrating with infrastructure-as-code pipelines.
Data stored by Macie (findings, jobs, custom identifiers, etc.) is encrypted at rest using AWS KMS (AWS-managed keys). Inter-service communications are conducted over PrivateLink/VPC endpoints to avoid public Internet exposure.
Macie can be enabled for an entire AWS Organization, allowing a Macie admin account to centrally manage and monitor member accounts’ buckets, unify discovery settings, and aggregate results. Ensure that the service-linked IAM role has proper KMS permissions to scan encrypted objects.
| Recommendation | Description |
|---|---|
| Exclude certain buckets | Exclude log or test buckets to avoid false positives or unnecessary scans |
| Refine identifiers | Combine managed and custom identifiers, and use allow lists to reduce noise |
| Automate finding response | Use EventBridge + Lambda or Security Hub to auto-remediate risks like public access or missing encryption |

Automatically identify PII / PHI / financial data, monitor potential exposure, and maintain traceability for audits and compliance reporting.
Before or during S3 migrations, run targeted discovery jobs to detect sensitive data transfers, and apply controls like encryption or access restriction.
Continuously detect public buckets or newly added sensitive objects with real-time alerts and automated remediation via EventBridge or Security Hub.
Amazon Inspector and Amazon Macie are both AWS security services, but they serve very different purposes. Inspector focuses on infrastructure security, while Macie is designed to protect sensitive data. Here’s a comparison:
| Criteria | Amazon Inspector | Amazon Macie |
|---|---|---|
| Primary Purpose | Detecting vulnerabilities in resources (EC2, Lambda, ECR) | Discovering and protecting sensitive data in S3 |
| Threat Type | System vulnerabilities, outdated packages, misconfigurations | Accidental exposure of sensitive data (PII, PHI, secrets) |
| Analyzed Sources | EC2, Lambda, container images in ECR | S3 buckets and objects |
| Methodology | Continuous CVE-based scoring with contextual awareness | Pattern matching and ML-based content classification |
| Risk Score | β Yes (contextual CVSS score) | β Yes (bucket sensitivity score) |
| Automation | Fully continuous | Auto-discovery + on-demand jobs |
| Typical Use Cases | Securing workload posture | Data compliance, leak prevention |
| Security Hub Integration | β Yes | β Yes |
| Pricing Model | Per analyzed resource | Per GB scanned and bucket evaluated |
In short, Amazon Inspector protects the container (your infrastructure), while Amazon Macie protects the content (your data). Used together, they provide complementary security coverage for any AWS environment focused on compliance and data protection.
This section explains how to configure and manage Managed Data Identifiers directly in the Amazon Macie console, controlling which data types are inspected automatically or via custom jobs.
On the Automated sensitive data discovery page, you’ll find two tabs:
β Note: The default selection (“ALL”) includes all current and future AWS-managed identifiers automatically.
Custom Data Identifiers let you detect internal formats using regular expressions and optional keyword matching.
Your custom identifiers will appear in the discovery configuration options and can be used in jobs.
Allow lists define patterns or exact values that Macie should ignore, useful for skipping public/test data that might otherwise be flagged.
You can also test your regex pattern with a sample.
To exclude (or include) buckets from automated scanning:
| Action | Where to Do It | What Macie Does |
|---|---|---|
| Add data identifiers | Settings β Automated sensitive data discovery β Edit identifiers | Includes them in future scans |
| Create custom identifier | Settings β Custom data identifiers β Create | Enables detection of internal data patterns |
| Manage allow list | Settings β Automated sensitive data discovery β Allow lists | Skips false positives or known-safe content |
| Exclude a bucket | Settings β Automated sensitive data discovery β Exclusion list | Bucket is ignored in automated discovery |
Amazon Macie is a comprehensive solution for data security and privacy, purpose-built for Amazon S3. It combines automated discovery, precise classification, security integrations, and organization-wide visibility to help teams monitor and protect sensitive data effectively. Adopting Macie helps reduce exposure risks and supports compliance with data protection regulations.