heroui logo

AWS S3 Bucket Server Access Logging Disabled

Elastic Detection Rules

View Source
Summary
The detection rule identifies when server access logging is disabled for an Amazon S3 bucket, which is critical for understanding the request history to the bucket and may indicate attempts to hide unauthorized actions. When logging is disabled, it prevents the recording of requests that could highlight malicious activity, thus impairing defenses. The rule examines CloudTrail logs to detect actions where the `PutBucketLogging` action is successful but does not include `LoggingEnabled` in the request parameters. A detailed investigation process is outlined, emphasizing the need to review the affected bucket, user actions, recent changes, and correlate potential suspicious activities. It is essential to quickly respond to unauthorized changes, enhance monitoring mechanisms, and educate users about security best practices regarding S3 environments.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Storage
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1562
  • T1562.008
Created: 2024-07-12