
Summary
This detection rule targets `PutBucketLifecycle` events in AWS CloudTrail logs, aiming to identify instances where a user sets a lifecycle rule for an S3 bucket with a notably short expiration period of fewer than three days. This kind of configuration is particularly alarming as it may indicate an attacker’s intent to delete CloudTrail logs rapidly, thereby hindering detection and complicating forensic investigations. The rule utilizes CloudTrail logs' insights to flag suspicious lifecycle configurations, which can imply significant security risks, especially in the context of tracking and responding to potential breaches. The search query is crafted to parse and analyze AWS events in the context of these lifecycle rules, filtering out relevant records to detect malicious behaviors effectively.
Categories
- AWS
- Cloud
- Infrastructure
Data Sources
- Cloud Storage
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562.008
- T1562
- T1485.001
- T1485
Created: 2024-12-16