Skip to content

Hide Navigation Hide TOC

Cloud Storage Modification (45977f14-1bcc-4ec4-ac14-a30fd3a11f44)

Cloud Storage Modification involves tracking changes made to cloud storage infrastructure, including updates to settings, permissions, or stored data. Examples include modifying object access control lists (ACLs), uploading new objects, or updating bucket policies. Examples:

AWS S3: An object is uploaded or its ACL is modified. - Azure Blob Storage: A blob's metadata or permissions are updated. - Google Cloud Storage: An object's lifecycle policy is updated, or a bucket policy is changed. - OpenStack Swift: Modifications to container settings or uploading of new objects.

This data component can be collected through the following measures:

Enable Logging

  • AWS S3: Enable AWS CloudTrail to log API events like PutObject, PutObjectAcl, and PutBucketPolicy.
  • Azure Blob Storage: Use Azure Monitor to log write and update operations.
  • Google Cloud Storage: Enable Google Cloud Audit Logs to track storage.objects.update and storage.buckets.update.
  • OpenStack Swift: Enable logging for PUT and POST requests to track object uploads and container metadata updates.

Use Cloud Monitoring Tools

  • Integrate with tools like AWS Config, Azure Security Center, or Google Cloud Monitoring to detect configuration drift or unauthorized changes.

Centralized Log Aggregation

  • Use a SIEM (e.g., Splunk) to aggregate logs across multiple cloud providers for unified monitoring and analysis.

Periodic API Queries

  • AWS CLI Example: Query recent modifications to bucket policies: aws s3api get-bucket-policy --bucket sensitive-data
  • Azure CLI Example: List changes to a blob container: az storage blob show --container-name private-docs
  • Google Cloud CLI Example: Check metadata updates: gcloud storage objects describe gs://user-uploads/document.txt
Cluster A Galaxy A Cluster B Galaxy B Level
Data Destruction - T1485 (d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c) Attack Pattern Cloud Storage Modification (45977f14-1bcc-4ec4-ac14-a30fd3a11f44) mitre-data-component 1
Lifecycle-Triggered Deletion - T1485.001 (1001e0d6-ee09-4dfc-aa90-e9320ffc8fe4) Attack Pattern Cloud Storage Modification (45977f14-1bcc-4ec4-ac14-a30fd3a11f44) mitre-data-component 1
Cloud Storage Modification (45977f14-1bcc-4ec4-ac14-a30fd3a11f44) mitre-data-component Data Encrypted for Impact - T1486 (b80d107d-fa0d-4b60-9684-b0433e8bdba0) Attack Pattern 1
Cloud Storage Modification (45977f14-1bcc-4ec4-ac14-a30fd3a11f44) mitre-data-component Transfer Data to Cloud Account - T1537 (d4bdbdea-eaec-4071-b4f9-5105e12ea4b6) Attack Pattern 1
Data Destruction - T1485 (d45a3d09-b3cf-48f4-9f0f-f521ee5cb05c) Attack Pattern Lifecycle-Triggered Deletion - T1485.001 (1001e0d6-ee09-4dfc-aa90-e9320ffc8fe4) Attack Pattern 2