
Summary
This detection rule identifies instances when an Amazon S3 bucket policy is altered to provide public access, specifically when the policy includes a wildcard ('*') in the Principal field alongside an Allow effect. The rule focuses on the 'PutBucketPolicy' API events and flags configurations that might expose sensitive data to unauthorized users, leading to potential data leaks or unauthorized data collection. By monitoring these changes, organizations can respond to threats stemming from public policies that may inadvertently make private data accessible. It advises analysts to investigate further to assess the severity of such changes, especially in terms of the permissions granted and whether any Deny statements exist that may mitigate the exposure. The rule also offers a comprehensive response and remediation strategy to address unauthorized public access configurations in AWS S3.
Categories
- Cloud
Data Sources
- Cloud Service
- Cloud Storage
- Application Log
- Network Traffic
ATT&CK Techniques
- T1537
- T1530
Created: 2025-10-30