Detectionmediumtest
AWS S3 Bucket Versioning Disable
Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
AWScloudtrail
ProductAWS← raw: aws
Servicecloudtrail← raw: cloudtrail
Detection Logic
Detection Logic1 selector
detection:
selection:
eventSource: s3.amazonaws.com
eventName: PutBucketVersioning
requestParameters|contains: 'Suspended'
condition: selectionFalse Positives
AWS administrator legitimately disabling bucket versioning
References
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
a136ac98-b2bc-4189-a14d-f0d0388e57a7
Status
test
Level
medium
Type
Detection
Created
Sat Oct 28
Author
Path
rules/cloud/aws/cloudtrail/aws_disable_bucket_versioning.yml
Raw Tags
attack.impactattack.t1490