
Summary
The AWS S3 Bucket Policy Modified rule monitors changes to Amazon S3 bucket policies through CloudTrail logs. It triggers upon events that modify these policies, which could indicate policy escalation or unauthorized access attempts. The rule includes tests for successful modifications, errors due to access denial, and checks for when no modifications occur. It emphasizes the importance of safeguarding bucket policies to prevent exfiltration and improper access, aligning with recommended practices laid out by the Cloud Infrastructure Security (CIS) benchmarks and the MITRE ATT&CK framework. This rule serves as a proactive measure to ensure that any changes made to S3 bucket policies are legitimate and authorized, thus protecting sensitive data against potential threats.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Logon Session
ATT&CK Techniques
- T1567
Created: 2022-09-02