
Summary
This detection rule identifies potentially malicious activity involving the suspension of versioning on AWS S3 buckets. By monitoring AWS CloudTrail logs for `PutBucketVersioning` events, the rule captures actions where the `VersioningConfiguration.Status` changes to `Suspended`. Disabling versioning can undermine data recovery, making it an appealing tactic for attackers, particularly in ransomware scenarios where restoration of deleted or altered data is critical. The detection helps in monitoring cloud environments for suspicious modifications that could lead to severe data integrity and availability implications. Administrators should investigate such events promptly, as they may point to unauthorized access or malicious intents.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Cloud Service
- Application Log
ATT&CK Techniques
- T1490
Created: 2024-11-14