You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: baselines/baseline_of_open_s3_bucket_decommissioning.yml
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -1,15 +1,16 @@
1
-
data_source: []
2
-
mitre_attack_ids: ''
3
-
security_domain: audit
4
1
name: Baseline Of Open S3 Bucket Decommissioning
5
2
id: 984e9022-b87b-499a-a260-8d0282c46ea2
6
3
version: 1
7
4
date: '2025-02-12'
8
5
author: Jose Hernandez
9
6
type: Baseline
10
7
status: production
11
-
description: This baseline search identifies S3 buckets that were previously exposed to the public (either through bucket policies or website hosting) and have been subsequently deleted. This helps track the lifecycle of potentially risky S3 bucket configurations and their proper decommissioning.
12
-
kind: cloud
8
+
description: |-
9
+
The following analytic identifies S3 buckets that were previously exposed to the public and have been subsequently deleted. It leverages AWS CloudTrail logs to track the lifecycle of potentially risky S3 bucket configurations. This activity is crucial for ensuring that public access to sensitive data is properly managed and decommissioned. By monitoring these events, organizations can ensure that exposed buckets are promptly deleted, reducing the risk of unauthorized access. Immediate investigation is recommended to confirm the proper decommissioning of these buckets and to ensure no sensitive data remains exposed. This baseline detection creates a lookup table of decommissioned buckets.csv and their associated events which can be used by detection searches to trigger alerts when decommissioned buckets are detected.
10
+
11
+
The following detections searches leverage this baseline search and the lookup table.
12
+
* Detect DNS Query to Decommissioned S3 Bucket
13
+
* Detect Web Access to Decommissioned S3 Bucket
13
14
search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR eventName=PutBucketPolicy OR eventName=PutBucketWebsite)
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup file named decommissioned_buckets.csv which tracks the history of deleted buckets that were previously exposed to the public.
41
42
known_false_positives: Some buckets may be intentionally made public for legitimate business purposes before being decommissioned. Review the policy_details and website_details fields to understand the nature of the public access that was configured.
42
43
references:
@@ -47,7 +48,6 @@ tags:
47
48
analytic_story:
48
49
- AWS S3 Bucket Security Monitoring
49
50
- Suspicious AWS S3 Activities
50
-
message: An S3 bucket that was previously configured with public access has been deleted
Copy file name to clipboardExpand all lines: detections/network/detect_dns_query_to_decommissioned_s3_bucket.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ version: 1
4
4
date: '2025-02-12'
5
5
author: Jose Hernandez, Splunk
6
6
status: experimental
7
-
type: anomaly
7
+
type: Anomaly
8
8
description: This detection identifies DNS queries to domains that match previously decommissioned S3 buckets. This activity is significant because attackers may attempt to recreate deleted S3 buckets that were previously public to hijack them for malicious purposes. If successful, this could allow attackers to host malicious content or exfiltrate data through compromised bucket names that may still be referenced by legitimate applications.
how_to_implement: To successfully implement this detection, you need to be ingesting DNS query logs and have them mapped to the Network_Resolution data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets.csv lookup file.
Copy file name to clipboardExpand all lines: detections/web/detect_web_access_to_decommissioned_s3_bucket.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ version: 1
4
4
date: '2025-02-12'
5
5
author: Jose Hernandez, Splunk
6
6
status: experimental
7
-
type: anomaly
7
+
type: Anomaly
8
8
description: This detection identifies web requests to domains that match previously decommissioned S3 buckets through web proxy logs. This activity is significant because attackers may attempt to access or recreate deleted S3 buckets that were previously public to hijack them for malicious purposes. If successful, this could allow attackers to host malicious content or exfiltrate data through compromised bucket names that may still be referenced by legitimate applications.
how_to_implement: To successfully implement this detection, you need to be ingesting web proxy logs and have them mapped to the Web data model. Additionally, ensure that the baseline search "Baseline Of Open S3 Bucket Decommissioning" is running and populating the decommissioned_buckets.csv lookup file.
description: A lookup table of decommissioned S3 buckets created by baseline - Baseline of Open S3 Bucket Decommissioning. This lookup table is used by detections searches to trigger alerts when decommissioned buckets are detected.
0 commit comments