
Summary
This detection rule identifies the invocation of the AWS API call `GetBucketVersioning`, which is essential for threat actors in reconnaissance efforts following unauthorized access to an AWS account. By retrieving the versioning state of an S3 bucket, an attacker can gather information about the data management practices in place, including whether versioning is enabled or not. This insight can inform subsequent malicious actions, such as data exfiltration, modification, or deletion. The rule captures relevant information such as the time of the API call, the AWS account and region involved, the source IP address, and user details. By analyzing this data through CloudTrail logs, security teams can identify potential acts of reconnaissance and take proactive measures to secure the cloud environment.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Service
- Cloud Storage
ATT&CK Techniques
- T1580
- T1619
Created: 2024-02-26