
Summary
The AWS S3 DeleteBucketReplication rule is designed to detect when the replication configuration of an S3 bucket is deleted. This action is significant as it could hinder data backup and may signify preparation for ransomware activities. The rule leverages AWS CloudTrail logs to trigger alerts when a DELETE action on bucket replication settings is recorded. The automated response involves querying CloudTrail for prior S3 API calls associated with the same bucket and assessing the historical context of the user’s actions regarding bucket replication. Additionally, it checks for evidence of other security controls being disabled, which aids in identifying potential ransomware preparation. The severity of this rule is set to medium, and it is currently classified as experimental, indicating that it may still be under fine-tuning to improve its detection capabilities.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Logon Session
- Network Share
ATT&CK Techniques
- T1562
- T1485
Created: 2025-12-10