AWS S3 Data Management Tampering
Detects when a user tampers with S3 data management in Amazon Web Services.
Sigma rule (View on GitHub)
1title: AWS S3 Data Management Tampering
2id: 78b3756a-7804-4ef7-8555-7b9024a02e2d
3status: test
4description: Detects when a user tampers with S3 data management in Amazon Web Services.
5references:
6 - https://github.com/elastic/detection-rules/pull/1145/files
7 - https://docs.aws.amazon.com/AmazonS3/latest/API/API_Operations.html
8 - https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLogging.html
9 - https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketWebsite.html
10 - https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
11 - https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html
12 - https://docs.aws.amazon.com/AmazonS3/latest/API/API_RestoreObject.html
13author: Austin Songer @austinsonger
14date: 2021-07-24
15modified: 2022-10-09
16tags:
17 - attack.exfiltration
18 - attack.t1537
19logsource:
20 product: aws
21 service: cloudtrail
22detection:
23 selection:
24 eventSource: s3.amazonaws.com
25 eventName:
26 - PutBucketLogging
27 - PutBucketWebsite
28 - PutEncryptionConfiguration
29 - PutLifecycleConfiguration
30 - PutReplicationConfiguration
31 - ReplicateObject
32 - RestoreObject
33 condition: selection
34falsepositives:
35 - A S3 configuration change may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. S3 configuration change from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
36level: low
References
Related rules
- AWS EC2 VM Export Failure
- AWS Snapshot Backup Exfiltration
- Data Exfiltration to Unsanctioned Apps
- Suspicious BlackCat-Related Exfiltration Command
- APT40 Dropbox Tool User Agent