
Summary
This rule ('S3 Bucket Logging Disabled') is designed to detect when server access logging is disabled on an Amazon S3 bucket. The rule operates by checking CloudTrail logs to identify the specific API calls related to the S3 bucket logging status. When logging is disabled, it removes an important audit trail that can highlight potential ransomware preparation activities or attempts at evasion of detection mechanisms. The rule leverages API call data such as 'PutBucketLogging' events to establish whether logging status was modified. Further investigation steps including analyzing related API calls over a specific timeframe, and checking for historical changes to logging configurations are recommended to ascertain whether the disabling of logging results from an attack or legitimate administrative actions. Additionally, the rule is tagged with multiple identifiers related to AWS and its impact on data destruction, and it continuously monitors the bucket's logging status to alert administrators about potentially malicious activities.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Application Log
- Network Traffic
ATT&CK Techniques
- T1562
- T1485
Created: 2025-12-10