Detectionlowtest
Potential Bucket Enumeration on AWS
Looks for potential enumeration of AWS buckets via ListBuckets.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Christopher Peacock, SCYTHECreated Fri Jan 06Updated Wed Jul 10f305fd62-beca-47da-ad95-7690a0620084cloud
Log Source
AWScloudtrail
ProductAWS← raw: aws
Servicecloudtrail← raw: cloudtrail
Detection Logic
Detection Logic2 selectors
detection:
selection:
eventSource: 's3.amazonaws.com'
eventName: 'ListBuckets'
filter:
userIdentity.type: 'AssumedRole'
condition: selection and not filterFalse Positives
Administrators listing buckets, it may be necessary to filter out users who commonly conduct this activity.
MITRE ATT&CK
Related Rules
Similar
Rule not found4723218f-2048-41f6-bcb0-417f2d784f61
Rule Metadata
Rule ID
f305fd62-beca-47da-ad95-7690a0620084
Status
test
Level
low
Type
Detection
Created
Fri Jan 06
Modified
Wed Jul 10
Author
Path
rules/cloud/aws/cloudtrail/aws_enum_buckets.yml
Raw Tags
attack.discoveryattack.t1580attack.t1619