
Summary
This detection rule identifies potential tampering actions performed on Amazon S3 data management configurations by monitoring specific API interactions through AWS CloudTrail logs. It focuses on events that signify a change or manipulation in critical S3 configurations such as bucket logging, website settings, encryption settings, lifecycle policies, and object restoration processes. The rule is designed to alert on actions that could indicate unauthorized attempts to alter the configuration or data management capabilities of S3 resources. Given the nature of these changes, which can significantly impact data accessibility and security, detecting such modifications is crucial for maintaining the integrity of cloud storage environments. The rule is currently set to a low alert level, suggesting that while these actions are noteworthy, they may also be performed routinely by administrators. Therefore, false positives are a consideration, especially when changes are made by known users in a managed environment.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
Created: 2021-07-24