
Summary
This analytic rule is designed to detect the creation of open or public Amazon S3 buckets in AWS environments by analyzing CloudTrail event logs. It focuses specifically on the `PutBucketAcl` actions, which modify the Access Control List (ACL) settings of S3 buckets. The detection mechanism examines ACLs that grant permissions to all users (e.g., the `AllUsers` group) or to authenticated users, which poses a significant risk of data exposure and breaches. By tracking the creation of such publicly accessible buckets, the rule aims to prevent unauthorized data access, exfiltration, and potential tampering of sensitive information stored in these buckets. The functionality relies on the `cloudtrail` data source, utilizing specific criteria such as observed permissions and grantees to pinpoint potential security incidents.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1530
Created: 2024-11-14