Antivirus for Managed File Transfers on AWS
Partner Solution Deployment Guide

July 2023
David Dreyer, Aaron Gettings, and Sarah Heiermann-Walker, Cloud Storage Security
Russ Boyer, AWS Transfer Family team, and Dave May, AWS Integration and Automation

Refer to the GitHub repository to view source files, report bugs, submit feature ideas, and post feedback about this Partner Solution. To comment on the documentation, refer to Feedback. |
This Partner Solution was created by Cloud Storage Security in collaboration with Amazon Web Services (AWS). Partner Solutions are automated reference deployments that help people deploy popular technologies on AWS according to AWS best practices. If you’re unfamiliar with AWS Partner Solutions, refer to the AWS Partner Solution General Information Guide.
Overview
This guide covers the information you need to deploy the Antivirus for Managed File Transfers Partner Solution in the AWS Cloud.
This Amazon Web Services (AWS) Partner Solution deploys Antivirus for Managed File Transfers in the AWS Cloud so that organizations can scan file exchange workloads for malicious code. This solution is for new and existing AWS Transfer Family users who want to simplify the implementation of malware scanning as well as streamline antivirus and Transfer Family deployments. It allows users to easily validate data cleanliness and reduce the risk of ingesting and sharing infected files as part of their cloud-based data transfer process.
For more information about the product, troubleshooting, or additional functionality, refer to the Cloud Storage Security documentation.
Costs and licenses
Antivirus for Managed File Transfers is offered on a pay-as-you-go model, with pricing based on the amount of data scanned.
Contact Cloud Storage Security to discuss personalized pricing options, including prepaid discounts and private offers.
In addition to CSS costs incurred by scanning data, AWS will bill you for the resources deployed. For more information, refer to the AWS Partner Solution General Information Guide.
Architecture
Deploying this Partner Solution with default parameters builds the following Antivirus for Managed File Transfers environment in the AWS Cloud.

As shown in Figure 1, this Partner Solution sets up the following:
-
An ECS Fargate Cluster that contains:
-
A console service for the web application
-
A highly-scalable event agent to process newly created objects
-
Highly-scalable tasks to execute scheduled and on-demand scanning
-
Highly-scalable API endpoint service for API-driven scans
-
-
A Transfer Family Server and S3 bucket (optional)
-
An SNS Topic to capture create object events
-
An SQS Event Queue to manage the scan processes
-
A Cognito User Pool to provision and manage users for the web application
-
A DynamoDB database to store data related to the scans and deployment
-
CloudWatch Logs to capture details from all events
Deployment options
This Partner Solution provides the following deployment option to provision Antivirus for Managed File Transfers into the VPC of your choosing:
These deployments use CloudFormations templates that contain configuration parameters that you can customize.
Predeployment steps
Subscribe to the Marketplace listing
Visit Antivirus for Amazon S3 - PAYG with 30 DAY FREE TRIAL on Amazon Marketplace and click "Continue to Subscribe" to begin a Marketplace subscription.
Deployment steps
-
Sign in to your AWS account, and launch this Partner Solution, as described under Deployment options. The AWS CloudFormation console opens with a prepopulated template.
-
Choose the correct AWS Region, and then choose Next.
-
On the Create stack page, keep the default setting for the template URL, and then choose Next.
-
On the Specify stack details page, change the stack name if needed. Review the parameters for the template. Provide values for the parameters that require input. For all other parameters, review the default settings and customize them as necessary. When you finish reviewing and customizing the parameters, choose Next.
Unless you’re customizing the Partner Solution templates or are instructed otherwise in this guide’s Predeployment section, don’t change the default settings for the following parameters: QSS3BucketName
,QSS3BucketRegion
, andQSS3KeyPrefix
. Changing the values of these parameters will modify code references that point to the Amazon Simple Storage Service (Amazon S3) bucket name and key prefix. For more information, refer to the AWS Partner Solutions Contributor’s Guide. -
On the Configure stack options page, you can specify tags (key-value pairs) for resources in your stack and set advanced options. When you finish, choose Next.
-
On the Review page, review and confirm the template settings. Under Capabilities, select all of the check boxes to acknowledge that the template creates AWS Identity and Access Management (IAM) resources that might require the ability to automatically expand macros.
-
Choose Create stack. The stack takes about 10-15 minutes to deploy.
-
Monitor the stack’s status, and when the status is CREATE_COMPLETE, the Antivirus for Managed File Transfers deployment is ready.
-
To view the created resources, choose the Outputs tab.
Postdeployment steps
To get started with the Antivirus for Managed File Transfers console:
-
Login to the email address previously added to the Admin User Email field within the CloudFormation Template during deployment.
-
Locate the Antivirus for Amazon S3 - Console Account Information email.
-
Open the console link and login using the provided temporary credentials.
-
Upon login you will be prompted to update your password.
-
Make any desired changes.
To get started with your new Transfer Family Server*:
-
Review the pre-configured settings of your Server within the AWS Console.
-
We recommend that you connect to your server and upload a test file.
-
Please note that:
-
The server’s protocol will be SFTP (SSH File Transfer Protocol) - file transfer over Secure Shell.
-
The server will have a public endpoint.
-
A Lambda function is created during the deployment and will validate authentication for secure file transfers.
-
Files will be uploaded to S3 directly and will trigger an event-based scan by Antivirus for Managed File Transfers.
-
The username and password to connect to the server will be the same username and password established within the Antivirus for Managed File Transfers console.
-
*If you chose to have a Transfer Family Server created as part of your deployment.
For more information on getting started with Antivirus for Managed File Transfers, please visit: How to Configure.
Troubleshooting
For troubleshooting common Partner Solution issues, refer to the AWS Partner Solution General Information Guide and Troubleshooting CloudFormation.
For troubleshooting Antivirus for Managed File Transfers, see the Cloud Storage Security Help Docs.
Customer responsibility
After you deploy a Partner Solution, confirm that your resources and services are updated and configured—including any required patches—to meet your security and other needs. For more information, refer to the Shared Responsibility Model.
Feedback
To submit feature ideas and report bugs, use the Issues section of the GitHub repository for this Partner Solution. To submit code, refer to the Partner Solution Contributor’s Guide. To submit feedback on this deployment guide, use the following GitHub links:
Notices
This document is provided for informational purposes only. It represents current AWS product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS products or services, each of which is provided "as is" without warranty of any kind, whether expressed or implied. This document does not create any warranties, representations, contractual commitments, conditions, or assurances from AWS, its affiliates, suppliers, or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers.
The software included with this paper is licensed under the Apache License, version 2.0 (the "License"). You may not use this file except in compliance with the License. A copy of the License is located at https://aws.amazon.com/apache2.0/ or in the accompanying "license" file. This code is distributed on an "as is" basis, without warranties or conditions of any kind, either expressed or implied. Refer to the License for specific language governing permissions and limitations.