Techniques
Sample rules
AWS S3 Bucket Configuration Deletion
- source: elastic
- technicques:
- T1070
- T1490
- T1562
Description
Identifies the deletion of critical Amazon S3 bucket configurations such as bucket policies, lifecycle configurations or encryption settings. These actions are typically administrative but may also represent adversarial attempts to remove security controls, disable data retention mechanisms, or conceal evidence of malicious activity. Adversaries who gain access to AWS credentials may delete logging, lifecycle, or policy configurations to disrupt forensic visibility and inhibit recovery. For example, deleting a bucket policy can open a bucket to public access or remove protective access restrictions, while deleting lifecycle rules can prevent object archival or automatic backups. Such actions often precede data exfiltration or destructive operations and should be reviewed in context with related S3 or IAM events.
Detection logic
event.dataset:aws.cloudtrail and
event.provider:s3.amazonaws.com and
event.action:(DeleteBucketPolicy or
DeleteBucketReplication or
DeleteBucketCors or
DeleteBucketEncryption or
DeleteBucketLifecycle) and
event.outcome:success