
Summary
This detection rule aims to identify instances where the S3 Browser utility is used to create an Inline IAM policy that contains a default placeholder for an S3 bucket name, specifically "<YOUR-BUCKET-NAME>". This is significant because it can indicate misconfigured permissions that may lead to unauthorized access to S3 resources. The rule focuses on AWS CloudTrail logs, monitoring events where the IAM service receives requests to apply a user policy that includes default values, which are often indicative of oversight or an attack vector. The rule looks for specific attributes in the request, such as the event source (iam.amazonaws.com), event name (PutUserPolicy), and ensures that the user agent contains "S3 Browser" while also checking the request parameters for the presence of default bucket name elements. This helps to filter out instances of legitimate use and highlights potentially harmful configurations that need to be addressed.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- User Account
Created: 2023-05-17