What this looks like in the scanner
securecompass.io/public-exposure-scanner
Critical
snap-0a1b2c3d4e5f6a7b8
EBS snapshot is shared publicly - any AWS account can copy and mount the volume data
High
snap-09d8c7b6a5e4f3d2
Unencrypted EBS snapshot of production database volume shared with external account
Medium
snap-01a2b3c4d5e6f7a8
EBS snapshot shared with AWS account no longer in the organization
What does Amazon EBS public exposure mean?
EBS snapshots can be shared publicly or with specific AWS accounts. A public snapshot means anyone with an AWS account can copy your snapshot, create a volume from it, and read all the data.
Why it matters
EBS volumes often contain operating system data, application code, databases, credentials, and configuration files. A publicly shared snapshot is equivalent to handing someone a copy of your hard drive.
How to check manually
- 1Open EC2 console → Snapshots and filter for "Public" sharing
- 2Review snapshot permissions for unexpected account IDs
- 3Check for unencrypted snapshots containing sensitive data
- 4Audit automated snapshot sharing policies
Quick check with AWS CLI
Find publicly shared EBS snapshots owned by your account
aws ec2 describe-snapshots --owner-ids self --query "Snapshots[].SnapshotId" --output text | xargs -I {} aws ec2 describe-snapshot-attribute --snapshot-id {} --attribute createVolumePermission --query "CreateVolumePermissions[?Group=='all']" 2>/dev/nullList all snapshots and their encryption status
aws ec2 describe-snapshots --owner-ids self --query "Snapshots[].{Id:SnapshotId,VolumeId:VolumeId,Encrypted:Encrypted,Size:VolumeSize}" --output tableCheck sharing permissions for a specific snapshot
aws ec2 describe-snapshot-attribute --snapshot-id YOUR_SNAPSHOT_ID --attribute createVolumePermissionCommon misconfigurations
Snapshot permissions set to Public instead of Private
Snapshots shared with accounts no longer in your organization
Unencrypted snapshots of production volumes
Automated backup policies creating public snapshots
Check all 22 resource types at once
Instead of checking each service manually, scan your entire AWS account and see every public exposure ranked by risk.
Scan My Account