heroui logo

S3 Bucket Encryption Deleted

Panther Rules

View Source
Summary
The rule 'AWS.S3.DeleteBucketEncryption' identifies critical security events in AWS S3 where the encryption settings for S3 buckets are deleted. This action may expose sensitive data to unauthorized access or be part of a ransomware strategy preparing for data exfiltration. The rule leverages AWS CloudTrail logs to monitor and track requests related to the deletion of bucket encryption. By analyzing these logs, administrators can identify potential malicious intent or misconfigurations that could lead to data loss. The runbook provides actionable steps to assess whether the deletion was a part of normal administrative activities or a signal of an attack, emphasizing the importance of proactive threat detection within the AWS environment. Detects actions associated with 'Defense Evasion' and 'Impact: Data Destruction' as outlined in the MITRE ATT&CK framework.
Categories
  • Cloud
  • AWS
  • Infrastructure
Data Sources
  • Cloud Storage
  • Logon Session
  • Process
ATT&CK Techniques
  • T1562
  • T1485
Created: 2025-12-10