Skills Cloud Storage Access Analysis

Cloud Storage Access Analysis

v20260317
analyzing-cloud-storage-access-patterns
Detects abnormal AWS S3, GCS, and Azure Blob access by analyzing CloudTrail, GCS audit logs, and Storage Analytics, flagging after-hours bulk downloads, new IPs, reconnaissance spikes, and exfiltration risks.
Get Skill
86 downloads
Overview

Instructions

  1. Install dependencies: pip install boto3 requests
  2. Query CloudTrail for S3 Data Events using AWS CLI or boto3.
  3. Build access baselines: hourly request volume, per-user object counts, source IP history.
  4. Detect anomalies:
    • After-hours access (outside 8am-6pm local time)
    • Bulk downloads: >100 GetObject calls from single principal in 1 hour
    • New source IPs not seen in the prior 30 days
    • ListBucket enumeration spikes (reconnaissance indicator)
  5. Generate prioritized findings report.
python scripts/agent.py --bucket my-sensitive-data --hours-back 24 --output s3_access_report.json

Examples

CloudTrail S3 Data Event

{"eventName": "GetObject", "requestParameters": {"bucketName": "sensitive-data", "key": "financials/q4.xlsx"},
 "sourceIPAddress": "203.0.113.50", "userIdentity": {"arn": "arn:aws:iam::123456789012:user/analyst"}}
Info
Category Uncategorized
Name analyzing-cloud-storage-access-patterns
Version v20260317
Size 8.63KB
Updated At 2026-03-18
Language