AWS IAM S3Browser Templated S3 Bucket Policy Creation
Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "
Sigma rule (View on GitHub)
1title: AWS IAM S3Browser Templated S3 Bucket Policy Creation
2id: db014773-7375-4f4e-b83b-133337c0ffee
3status: test
4description: Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "<YOUR-BUCKET-NAME>".
5references:
6 - https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor
7author: daniel.bohannon@permiso.io (@danielhbohannon)
8date: 2023-05-17
9modified: 2023-05-17
10tags:
11 - attack.execution
12 - attack.t1059.009
13 - attack.persistence
14 - attack.t1078.004
15logsource:
16 product: aws
17 service: cloudtrail
18detection:
19 selection:
20 eventSource: iam.amazonaws.com
21 eventName: PutUserPolicy
22 userAgent|contains: 'S3 Browser'
23 requestParameters|contains|all:
24 - '"arn:aws:s3:::<YOUR-BUCKET-NAME>/*"'
25 - '"s3:GetObject"'
26 - '"Allow"'
27 condition: selection
28falsepositives:
29 - Valid usage of S3 browser with accidental creation of default Inline IAM policy without changing default S3 bucket name placeholder value
30level: high
References
Related rules
- AWS IAM S3Browser LoginProfile Creation
- AWS IAM S3Browser User or AccessKey Creation
- Application AppID Uri Configuration Changes
- Application URI Configuration Changes
- Azure Kubernetes CronJob