An EC2 instance attempted to enumerate S3 bucket

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when an EC2 instance makes an API call to AWS to list all of the S3 Buckets.

Strategy

This rule lets you monitor CloudTrail to detect a ListBuckets API call with the session name prefixed with i-. A session name prefixed with i- typically indicates that it is an EC2 instance using an Instance Profile to communicate with other AWS services, which is a common attacker technique to see the full list of S3 buckets in your AWS account.

Triage and response

Determine if the EC2 instance should be making this API call.

  • If not a legitimate user/application, rotate the credentials, verify what else may have been accessed and open an investigation into how this instance was compromised.
  • If a legitimate user/application on the EC2 instance is making the ListBuckets API call, consider whether this API call is really needed.

Changelog

18 March 2022 - Updated rule severity and rule name.