
Summary
This rule detects instances when Amazon S3 bucket versioning is disabled, which can be a critical security concern during AWS ransomware incidents. Ransomware attackers often disable versioning to facilitate the deletion of existing backups, making recovery efforts more challenging. The detection rule monitors AWS CloudTrail logs specifically for events related to S3 bucket versioning configurations. When the 'PutBucketVersioning' event is recorded with a request indicating that versioning has been 'Suspended', it triggers an alert. The rule helps in identifying potential ransomware activities and other malicious actions aimed at compromising data integrity within AWS S3 storage. As such, maintaining bucket versioning is a key best practice for data protection in the cloud.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Service
- Application Log
Created: 2023-10-28