heroui logo

AWS S3 Insecure Access

Panther Rules

View Source
Summary
The AWS S3 Insecure Access rule detects instances where objects in an S3 bucket were accessed using an unencrypted HTTP connection instead of the secure HTTPS protocol. This rule aims to identify and mitigate insecure access practices that could compromise data integrity and confidentiality. The rule utilizes AWS S3 Server Access logs to monitor access requests, focusing specifically on the HTTP method used in those requests. If a request is made via HTTP rather than HTTPS, it is flagged as a potential security issue. The rule is designed to operate continuously, reporting violations of secure access protocols and providing a means for cloud administrators to harden security policies surrounding S3 bucket access. An effective runbook suggests modifying the S3 bucket policy to deny all HTTP access, ensuring that all communication with the S3 bucket is conducted securely over HTTPS. The severity of this rule is classified as low, indicating a moderate level of concern given that data exposure could still occur if sensitive data is accessed via HTTP.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Sensor Health
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1530
  • T0010
Created: 2022-09-02