Anomalous S3 bucket activity from user ARN
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detect when an AWS user performs S3 bucket write activities they do not usually perform.
Strategy
Monitor cloudtrail logs for S3 Data Plane events (@eventCategory:Data
) to detect when an AWS User (@userIdentity.arn
) is detected performing anomalous S3 Write (@evt.name:(Abort* OR Create* OR Delete* OR Initiate* OR Put* OR Replicate* OR Update*))
API calls.
Triage and response
- Determine if user:
{{@userIdentity.arn}}
should be performing the: {{@evt.name}}
API calls.- Use the Cloud SIEM - User Investigation dashboard to assess user activity.
- If not, investigate the user:
{{@userIdentity.arn}}
for indicators of account compromise and rotate credentials as necessary.
Changelog
27 October 2022 - Updated tags.