Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples:
GetObject
API to retrieve sensitive data from an AWS S3 bucket.Get Blob
or Get Blob Properties
.storage.objects.get
to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the GET
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
GetObject
and store them in a designated S3 bucket.GetBlob
and log metadata.storage.objects.get
API calls.Centralize and Aggregate Logs
Correlate with IAM Logs
Cloud storage access refers to the retrieval or interaction with data stored in cloud infrastructure. This data component includes activities such as reading, downloading, or accessing files and objects within cloud storage systems. Common examples include API calls like GetObject in AWS S3, which retrieves objects from cloud buckets. Examples:
GetObject
API to retrieve sensitive data from an AWS S3 bucket.Get Blob
or Get Blob Properties
.storage.objects.get
to download objects from - OpenStack Swift Storage Access: A user retrieves an object from OpenStack Swift using the GET
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
GetObject
and store them in a designated S3 bucket.GetBlob
and log metadata.storage.objects.get
API calls.Centralize and Aggregate Logs
Correlate with IAM Logs
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1619 | Cloud Storage Object Discovery |
Monitor for unusual queries to the cloud provider's storage service. Activity originating from unexpected sources may indicate improper permissions are set that is allowing access to data. Additionally, detecting failed attempts by a user for a certain object, followed by escalation of privileges by the same user, and access to the same object may be an indication of suspicious activity. |
|
Enterprise | T1530 | Data from Cloud Storage |
Monitor for unusual queries to the cloud provider's storage service. Activity originating from unexpected sources may indicate improper permissions are set and are allowing access to data. Additionally, detecting failed attempts by a user for a certain object, followed by escalation of privileges by the same user, and access to the same object may be an indication of suspicious activity. |
|
Enterprise | T1048 | Exfiltration Over Alternative Protocol |
Monitor for unusual queries to the cloud provider's storage service. Activity originating from unexpected sources may indicate improper permissions are set and are allowing access to data. Additionally, detecting failed attempts by a user for a certain object, followed by escalation of privileges by the same user, and access to the same object may be an indication of suspicious activity. Analytic 1 - Detecting Suspicious Cloud Storage Exfiltration
|
Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples:
CreateBucket
API call.Create Container
operation.storage.buckets.create
.PUT
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
Centralized Logging and Analysis
Cloud Storage Creation refers to the initial creation of a new cloud storage resource, such as buckets, containers, or directories, within a cloud environment. This action is critical to track as it might indicate the legitimate provisioning of resources or unauthorized actions taken by adversaries to stage, store, or exfiltrate data. Examples:
CreateBucket
API call.Create Container
operation.storage.buckets.create
.PUT
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
Centralized Logging and Analysis
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1537 | Transfer Data to Cloud Account |
Monitor account activity for attempts to create and share data, such as snapshots or backups, with untrusted or unusual accounts. Analytic 1 - Detecting Creation of Storage for Exfiltration
|
Cloud Storage Deletion refers to the removal or destruction of cloud storage infrastructure, such as buckets, containers, or directories, within a cloud environment. Monitoring this activity is critical to detecting potential unauthorized or malicious actions, such as data destruction by adversaries or accidental deletions that may lead to data loss. Examples:
DeleteBucket
API call.Delete Container
operation.storage.buckets.delete
API.DELETE
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
Centralized Logging and Analysis
Cloud Storage Deletion refers to the removal or destruction of cloud storage infrastructure, such as buckets, containers, or directories, within a cloud environment. Monitoring this activity is critical to detecting potential unauthorized or malicious actions, such as data destruction by adversaries or accidental deletions that may lead to data loss. Examples:
DeleteBucket
API call.Delete Container
operation.storage.buckets.delete
API.DELETE
method.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Services
Centralized Logging and Analysis
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1485 | Data Destruction |
Monitor for unexpected deletion of a cloud storage infrastructure, such as the |
|
Enterprise | T1490 | Inhibit System Recovery |
Monitor for unexpected deletion of a cloud storage objects (ex: AWS |
Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples:
ListBuckets
API call.storage.buckets.list
API.GET
method on the storage endpoint.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Enumeration
Centralized Log Aggregation
Cloud Storage Enumeration involves retrieving a list of available cloud storage infrastructure, such as buckets, containers, or objects, within a cloud environment. This activity may be performed for legitimate administrative purposes or malicious reconnaissance by adversaries seeking to identify accessible storage resources.Examples:
ListBuckets
API call.storage.buckets.list
API.GET
method on the storage endpoint.This data component can be collected through the following measures:
Enable Logging for Cloud Storage Enumeration
Centralized Log Aggregation
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1580 | Cloud Infrastructure Discovery |
Monitor cloud logs for API calls and other potentially unusual activity related to cloud data object storage enumeration. Discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Collection and Exfiltration, based on the information obtained. |
|
Enterprise | T1619 | Cloud Storage Object Discovery |
Monitor cloud logs for API calls used for file or object enumeration for unusual activity. System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Collection and Exfiltration, based on the information obtained. |
Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples:
This data component can be collected through the following measures:
Enable Logging for Metadata Collection
GetBucketAcl
, GetBucketPolicy
, and HeadBucket
API calls.storage.buckets.get
and storage.buckets.update
.HEAD
or GET
requests to containers.Centralized Log Aggregation
API Polling
aws s3api get-bucket-acl --bucket company-sensitive-data
az storage container show --name customer-records
gcloud storage buckets describe user-uploads
Cloud Storage Metadata provides contextual information about cloud storage infrastructure and its associated activity. This data may include attributes such as storage name, size, owner, permissions, creation date, region, and activity metadata. It is essential for monitoring, auditing, and identifying anomalies in cloud storage environments. Examples:
This data component can be collected through the following measures:
Enable Logging for Metadata Collection
GetBucketAcl
, GetBucketPolicy
, and HeadBucket
API calls.storage.buckets.get
and storage.buckets.update
.HEAD
or GET
requests to containers.Centralized Log Aggregation
API Polling
aws s3api get-bucket-acl --bucket company-sensitive-data
az storage container show --name customer-records
gcloud storage buckets describe user-uploads
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1537 | Transfer Data to Cloud Account |
Periodically baseline cloud storage infrastructure to identify malicious modifications or additions. |
Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples:
AWS S3: An object is uploaded or its ACL is modified.- Azure Blob Storage: A blob's metadata or permissions are updated.- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.- OpenStack Swift: Modifications to container settings or uploading of new objects.
This data component can be collected through the following measures:
Enable Logging
Use Cloud Monitoring Tools
Centralized Log Aggregation
Periodic API Queries
aws s3api get-bucket-policy --bucket sensitive-data
az storage blob show --container-name private-docs
gcloud storage objects describe gs://user-uploads/document.txt
Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples:
AWS S3: An object is uploaded or its ACL is modified.- Azure Blob Storage: A blob's metadata or permissions are updated.- Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed.- OpenStack Swift: Modifications to container settings or uploading of new objects.
This data component can be collected through the following measures:
Enable Logging
Use Cloud Monitoring Tools
Centralized Log Aggregation
Periodic API Queries
aws s3api get-bucket-policy --bucket sensitive-data
az storage blob show --container-name private-docs
gcloud storage objects describe gs://user-uploads/document.txt
Domain | ID | Name | Detects | |
---|---|---|---|---|
Enterprise | T1485 | Data Destruction |
Monitor for unexpected use of lifecycle policies. Where lifecycle policies are already in use, monitor for changes to cloud storage configurations and policies, such as buckets configured in the policy or unusually short retention periods. In AWS environments, monitor for |
|
.001 | Lifecycle-Triggered Deletion |
Monitor for unexpected use of lifecycle policies. Where lifecycle policies are already in use, monitor for changes to cloud storage configurations and policies, such as buckets configured in the policy or unusually short retention periods. In AWS environments, monitor for |
||
Enterprise | T1486 | Data Encrypted for Impact |
Monitor for changes made in cloud environments for events that indicate storage objects have been anomalously modified. |
|
Enterprise | T1537 | Transfer Data to Cloud Account |
Monitor for anomalous file transfer activity between accounts and/or to untrusted/unexpected VPCs. Analytic 1 - Detecting Cloud Storage Permission Changes for Exfiltration
|