Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
1 Hour |
Deduplication Period |
5 Days |
Required Data |
|
Detection Modules |
Cloud |
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
An identity downloaded multiple objects from a bucket, considerably more than usual.
This may indicate an attacker's attempt to download sensitive data from a bucket in the cloud environment.
Attacker's Goals
Exfiltrate sensitive data from the cloud environment.
Investigative actions
- Check the accessed bucket and objects designation.
- Verify that the identity did not download any sensitive information that it shouldn't.