An EC2 instance attempted to enumerate S3 bucket

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when an EC2 instance makes an API call to AWS to list all of the S3 Buckets.

Strategy

This rule lets you monitor CloudTrail to detect a ListBuckets API call with the session name prefixed with i-. A session name prefixed with i- typically indicates that it is an EC2 instance using an Instance Profile to communicate with other AWS services, which is a common attacker technique to see the full list of S3 buckets in your AWS account.

Triage and response

Determine if the EC2 instance should be making this API call.

  • If not a legitimate user/application, rotate the credentials, verify what else may have been accessed and open an investigation into how this instance was compromised.
  • If a legitimate user/application on the EC2 instance is making the ListBuckets API call, consider whether this API call is really needed.

Changelog

18 March 2022 - Updated rule severity and rule name.

PREVIEWING: esther/docs-9518-update-example-control-sensitive-log-data