heroui logo

AWS S3 Bucket Configuration Deletion

Elastic Detection Rules

View Source
Summary
This detection rule identifies potential deletions of configuration components within Amazon S3 buckets, an action that could be indicative of defense evasion tactics employed by adversaries. The rule triggers upon successful deletion actions captured in AWS CloudTrail logs, specifically looking for events that correspond to various S3 bucket configuration deletions such as bucket policies, replication configurations, CORS, encryption, and lifecycle policies. Given that the deletions might be performed by unauthorized users or malicious actors trying to remove security controls, it is crucial to investigate these actions promptly. The rule outlines a series of investigation steps, including correlation of event data with user actions, review of IAM policies to ensure only authorized actors are performing deletions, and also checks against routine administrative behaviors that may lead to false positives. The recommended response actions aim to quickly restore any lost configurations, assess the impacts on data security, and enhance monitoring and permissions around S3 bucket operations.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Network Traffic
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1070
Created: 2020-05-27