Detect New Open S3 Buckets

Description

This search looks for CloudTrail events where a user has created an open/public S3 bucket.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Advanced Threat Detection

Category

Cloud Security, SaaS

Alert Volume

This search looks for CloudTrail events where a user has created an open/public S3 bucket.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Collection

MITRE ATT&CK Techniques

Data from Cloud Storage Object

Data from Cloud Storage Object

Kill Chain Phases

Actions On Objectives

Data Sources

AWS
Audit Trail

   Help

Detect New Open S3 Buckets Help

You must install the AWS App for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS (version 4.4.0 or later), and then configure your CloudTrail inputs. The threshold value should be tuned to your environment.

   Search

Open in Search