T1530 Data from Cloud Storage

Adversaries may access data from cloud storage.

Many IaaS providers offer solutions for online data object storage such as Amazon S3, Azure Storage, and Google Cloud Storage. Similarly, SaaS enterprise platforms such as Office 365 and Google Workspace provide cloud-based document storage to users through services such as OneDrive and Google Drive, while SaaS application providers such as Slack, Confluence, Salesforce, and Dropbox may provide cloud storage solutions as a peripheral or primary use case of their platform.

In some cases, as with IaaS-based cloud storage, there exists no overarching application (such as SQL or Elasticsearch) with which to interact with the stored objects: instead, data from these solutions is retrieved directly though the Cloud API. In SaaS applications, adversaries may be able to collect this data directly from APIs or backend cloud storage objects, rather than through their front-end application or interface (i.e., Data from Information Repositories).

Adversaries may collect sensitive data from these cloud storage solutions. Providers typically offer security guides to help end users configure systems, though misconfigurations are a common problem.(Citation: Amazon S3 Security, 2019)(Citation: Microsoft Azure Storage Security, 2019)(Citation: Google Cloud Storage Best Practices, 2019) There have been numerous incidents where cloud storage has been improperly secured, typically by unintentionally allowing public access to unauthenticated users, overly-broad access by all users, or even access for any anonymous person outside the control of the Identity Access Management system without even needing basic user permissions.

This open access may expose various types of sensitive data, such as credit cards, personally identifiable information, or medical records.(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breach, 2017)(Citation: Rclone-mega-extortion_05_2021)

Adversaries may also obtain then abuse leaked credentials from source repositories, logs, or other means as a way to gain access to cloud storage objects.

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.AA-05.02 Privileged system access Mitigates T1530 Data from Cloud Storage
Comments
This diagnostic statement protects against Data from Cloud Storage through the use of privileged account management and the use of multi-factor authentication.
References
    PR.DS-01.01 Data-at-rest protection Mitigates T1530 Data from Cloud Storage
    Comments
    This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
    References
      PR.DS-10.01 Data-in-use protection Mitigates T1530 Data from Cloud Storage
      Comments
      This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
      References
        PR.PS-01.06 Encryption management practices Mitigates T1530 Data from Cloud Storage
        Comments
        This diagnostic statement is associated with employing encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address data collection from cloud storage, encrypt data stored at rest in cloud storage. Managed encryption keys can be rotated by most providers. At a minimum, ensure an incident response plan to storage breach includes rotating the keys and test for impact on client applications.
        References
          PR.PS-01.07 Cryptographic keys and certificates Mitigates T1530 Data from Cloud Storage
          Comments
          This diagnostic statement protects against Data from Cloud Storage through the use of revocation of keys and key management used in multi-factor authentication. Employing key protection strategies, limitations to specific accounts along with access control mechanisms provides protection against adversaries attempting to access data from cloud storage.
          References
            ID.AM-08.03 Data governance and lifecycle management Mitigates T1530 Data from Cloud Storage
            Comments
            This diagnostic statement prevents adversaries from collecting sensitive data from cloud storage solutions, such as Amazon S3, Azure, Storage, and Google Cloud. Permissions on cloud storage should be frequently checked and encrypting sensitive data in the cloud should be managed properly. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
            References
              PR.AA-01.02 Physical and logical access Mitigates T1530 Data from Cloud Storage
              Comments
              This diagnostic statement describes how the organization ensures users are identified and authenticated before accessing systems, applications, and hardware, with logical access controls permitting access only to authorized individuals with legitimate business needs. Logical access controls in relation to systems can refer to the use of MFA, user account management, and other role-based access control mechanisms to enforce policies for authentication and authorization of user accounts.
              References
                PR.AA-03.01 Authentication requirements Mitigates T1530 Data from Cloud Storage
                Comments
                This diagnostic statement describes how the organization implement appropriate authentication requirements, including selecting mechanisms based on risk, utilizing multi-factor authentication where necessary, and safeguarding the storage of authenticators like pins and passwords to protect sensitive access credentials.
                References
                  PR.IR-01.02 Network device configurations Mitigates T1530 Data from Cloud Storage
                  Comments
                  This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing IP-based restrictions for accessing cloud resources can mitigate adversary access to data in cloud storage.
                  References
                    PR.IR-01.03 Network communications integrity and availability Mitigates T1530 Data from Cloud Storage
                    Comments
                    This diagnostic statement protects against Data from Cloud Storage through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
                    References
                      EX.MM-01.01 Third-party monitoring and management resources Mitigates T1530 Data from Cloud Storage
                      Comments
                      This diagnostic statement provides for the implementation of procedures for management of third party products such as cloud storage solutions.
                      References
                        ID.AM-08.05 Data destruction procedures Mitigates T1530 Data from Cloud Storage
                        Comments
                        This diagnostic statement prevents adversaries from collecting sensitive data from cloud storage solutions, such as Amazon S3, Azure, Storage, and Google Cloud. Permissions on cloud storage should be frequently checked and encrypting sensitive data in the cloud should be managed properly. There may be some similarities to NIST 800-53 SI-12 Information Management and Retention. This may provide mitigation of data access/exfiltration techniques.
                        References
                          PR.AA-01.01 Identity and credential management Mitigates T1530 Data from Cloud Storage
                          Comments
                          This diagnostic statement protects against Data from Cloud Storage through the use of hardened access control policies, secure defaults, password complexity requirements, multifactor authentication requirements, and removal of terminated accounts.
                          References
                            PR.PS-01.05 Encryption standards Mitigates T1530 Data from Cloud Storage
                            Comments
                            This diagnostic statement is associated with employing strong encryption methods to mitigate unauthorized access or theft of data that protect the confidentiality and integrity of data-at-rest, data-in-use, and data-in-transit. To address data collection from cloud storage, encrypt data stored at rest in cloud storage. Managed encryption keys can be rotated by most providers. At a minimum, ensure an incident response plan to storage breach includes rotating the keys and test for impact on client applications.
                            References
                              PR.PS-01.08 End-user device protection Mitigates T1530 Data from Cloud Storage
                              Comments
                              This diagnostic statement protects against Data from Cloud Storage through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
                              References

                                NIST 800-53 Mappings

                                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                CA-07 Continuous Monitoring mitigates T1530 Data from Cloud Storage
                                CM-06 Configuration Settings mitigates T1530 Data from Cloud Storage
                                CM-05 Access Restrictions for Change mitigates T1530 Data from Cloud Storage
                                IA-05 Authenticator Management mitigates T1530 Data from Cloud Storage
                                AC-17 Remote Access mitigates T1530 Data from Cloud Storage
                                IA-08 Identification and Authentication (Non-Organizational Users) mitigates T1530 Data from Cloud Storage
                                IA-03 Device Identification and Authentication mitigates T1530 Data from Cloud Storage
                                IA-06 Authentication Feedback mitigates T1530 Data from Cloud Storage
                                AC-19 Access Control for Mobile Devices mitigates T1530 Data from Cloud Storage
                                IA-04 Identifier Management mitigates T1530 Data from Cloud Storage
                                SC-28 Protection of Information at Rest mitigates T1530 Data from Cloud Storage
                                SC-04 Information in Shared System Resources mitigates T1530 Data from Cloud Storage
                                SI-12 Information Management and Retention mitigates T1530 Data from Cloud Storage
                                RA-05 Vulnerability Monitoring and Scanning mitigates T1530 Data from Cloud Storage
                                CM-08 System Component Inventory mitigates T1530 Data from Cloud Storage
                                SI-10 Information Input Validation mitigates T1530 Data from Cloud Storage
                                SI-15 Information Output Filtering mitigates T1530 Data from Cloud Storage
                                SI-07 Software, Firmware, and Information Integrity mitigates T1530 Data from Cloud Storage
                                AC-16 Security and Privacy Attributes mitigates T1530 Data from Cloud Storage
                                AC-18 Wireless Access mitigates T1530 Data from Cloud Storage
                                AC-20 Use of External Systems mitigates T1530 Data from Cloud Storage
                                CM-02 Baseline Configuration mitigates T1530 Data from Cloud Storage
                                CM-02 Baseline Configuration mitigates T1530 Data from Cloud Storage
                                IA-02 Identification and Authentication (Organizational Users) mitigates T1530 Data from Cloud Storage
                                CM-07 Least Functionality mitigates T1530 Data from Cloud Storage
                                SI-04 System Monitoring mitigates T1530 Data from Cloud Storage
                                AC-02 Account Management mitigates T1530 Data from Cloud Storage
                                AC-03 Access Enforcement mitigates T1530 Data from Cloud Storage
                                AC-04 Information Flow Enforcement mitigates T1530 Data from Cloud Storage
                                AC-05 Separation of Duties mitigates T1530 Data from Cloud Storage
                                AC-06 Least Privilege mitigates T1530 Data from Cloud Storage
                                AC-07 Unsuccessful Logon Attempts mitigates T1530 Data from Cloud Storage
                                SC-07 Boundary Protection mitigates T1530 Data from Cloud Storage

                                VERIS Mappings

                                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                action.malware.variety.Capture stored data Capture data stored on system disk related-to T1530 Data from Cloud Storage
                                attribute.confidentiality.data_disclosure None related-to T1530 Data from Cloud Storage

                                Azure Mappings

                                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                defender_for_storage Microsoft Defender for Cloud: Defender for Storage technique_scores T1530 Data from Cloud Storage
                                azure_policy Azure Policy technique_scores T1530 Data from Cloud Storage
                                Comments
                                This control may provide recommendations to enable Azure Defender for Storage and other security controls to prevent access to data from cloud storage objects.
                                References
                                azure_role_based_access_control Azure Role-Based Access Control technique_scores T1530 Data from Cloud Storage
                                Comments
                                This control can be used to limit the number of users that have access to storage solutions except for the applications, users, and services that require access, thereby reducing the attack surface.
                                References

                                GCP Mappings

                                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                access_transparency Access Transparency technique_scores T1530 Data from Cloud Storage
                                Comments
                                Access Transparency provides visibility into Google's access to customer data in the form of audit logs. This may expose and detect malicious access of data from cloud storage by compromised Google personnel accounts.
                                References
                                advanced_protection_program Advanced Protection Program technique_scores T1530 Data from Cloud Storage
                                Comments
                                Advanced Protection Program enables the use of a security key for multi-factor authentication. Restricting access via MFA provides significant protection against adversaries accessing data objects from cloud storage.
                                References
                                chrome_enterprise_premium Chrome Enterprise Premium technique_scores T1530 Data from Cloud Storage
                                Comments
                                Chrome Enterprise Premium Access Context Manager allows organizations to manage and control access to sensitive content and applications based on user identity, device context, and other factors, essentially acting as a cloud-based content access manager with granular control capabilities.
                                References
                                cloud_ngfw Cloud Next-Generation Firewall (NGFW)_ technique_scores T1530 Data from Cloud Storage
                                Comments
                                Cloud NGFW can allow or deny traffic based on the traffic's protocol, destination ports, sources, and destinations. This functionality can be used to block adversaries from accessing resources such as cloud storage objects by implementing restrictions on which IP addresses and domains can access the resources (e.g., allow lists). However, since cloud storage objects are located outside the virtual private cloud where Cloud NGFW protect, the mapping is only given a score of Partial.
                                References
                                cloud_storage Cloud Storage technique_scores T1530 Data from Cloud Storage
                                Comments
                                The cloud service provider's default encryption setting for data stored and written to disk in the cloud may protect against adversary's attempt to access data from improperly secured cloud storage. This technique was rated as significant due to the high protect coverage factor.
                                References
                                google_secops Google Security Operations technique_scores T1530 Data from Cloud Storage
                                Comments
                                Google Security Ops is able to trigger an alert to notify personnel of GCP resources (e.g., storage buckets) that are publicly accessible to unauthenticated users. This technique was scored as minimal based on low or uncertain detection coverage factor. https://github.com/chronicle/detection-rules/blob/main/gcp_cloudaudit/gcp_gcs_public_accessible.yaral
                                References
                                policy_intelligence Policy Intelligence technique_scores T1530 Data from Cloud Storage
                                Comments
                                Policy Intelligence role recommendations generated by IAM Recommender can compare the permissions that each principal used during the past 90 days with the total permissions the principal has. This can be used to limit the permissions associated with creating and modifying platform images or containers that adversaries may try to access.
                                References
                                policy_intelligence Policy Intelligence technique_scores T1530 Data from Cloud Storage
                                Comments
                                Adversaries may attempt to implant cloud or container images with malicious code to gain access to an environment. The IAM audit logs can be used to receive data access and activity logs who has accessed to certain resources.
                                References
                                security_command_center Security Command Center technique_scores T1530 Data from Cloud Storage
                                Comments
                                SCC detect suspicious activity when accessing cloud storage objects (e.g., new IPs accessing storage objects or enumeration from unfamiliar user identities). Because of the real time temporal factor when detecting access to secure storage objects this control was graded as partial.
                                References
                                sensitive_data_protection Sensitive Data Protection technique_scores T1530 Data from Cloud Storage
                                Comments
                                This control is able to scan cloud storage objects for sensitive data and transform that data into a secure or nonsensitive form. It is able to scan for a variety of common sensitive data types, such as API keys, credentials, or credit card numbers. This control is able to be scheduled daily, weekly, etc and can scan new changes to data. This control is able to scan Google Cloud Storage, BigQuery tables, and Datastore.
                                References
                                vpc_service_controls VPC Service Controls technique_scores T1530 Data from Cloud Storage
                                Comments
                                This control may mitigate against access to cloud storage objects by limiting access to accounts and services contained within the VPC network perimeter that contains those cloud storage objects.
                                References

                                AWS Mappings

                                Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
                                amazon_guardduty Amazon GuardDuty technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                The following GuardDuty finding types flag events where adversaries may have access data objects from improperly secured cloud storage. UnauthorizedAccess:S3/MaliciousIPCaller.Custom UnauthorizedAccess:S3/TorIPCaller Impact:S3/MaliciousIPCaller Exfiltration:S3/MaliciousIPCaller Exfiltration:S3/ObjectRead.Unusual PenTest:S3/KaliLinux PenTest:S3/ParrotLinux PenTest:S3/PentooLinux UnauthorizedAccess:S3/MaliciousIPCaller.Custom UnauthorizedAccess:S3/TorIPCaller
                                References
                                aws_config AWS Config technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                The following AWS Config managed rules can identify configuration problems that should be fixed in order to prevent malicious access of data within Amazon Simple Storage Service (S3) storage: "s3-account-level-public-access-blocks", "s3-bucket-level-public-access-prohibited", "s3-bucket-public-read-prohibited", "s3-bucket-policy-not-more-permissive", "cloudfront-origin-access-identity-enabled", and "cloudfront-default-root-object-configured" identify objects that are publicly available or subject to overly permissive access policies; "s3-bucket-blacklisted-actions-prohibited" checks whether bucket policies prohibit disallowed actions for principals from other AWS accounts; and "s3-bucket-policy-grantee-check" checks whether bucket policies appropriately control which AWS principals, federated users, service principals, IP addresses, and VPCs have access. All of these controls are run on configuration changes. The following AWS Config managed rules can identify configuration problems that should be fixed in order to prevent malicious access of data from other AWS services: "dms-replication-not-public" for AWS Database Migration Service; "emr-master-no-public-ip" for Amazon Elastic MapReduce (EMR); "rds-cluster-iam-authentication-enabled", "rds-instance-iam-authentication-enabled", "rds-instance-public-access-check" and "rds-snapshots-public-prohibited" for Amazon Relational Database Service; "redshift-cluster-public-access-check" for Amazon Redshift; and "sagemaker-notebook-no-direct-internet-access" for SageMaker. The following AWS Config managed rules can identify configuration problems that should be fixed in order to ensure that cloud storage data are encrypted to prevent malicious access: "dax-encryption-enabled", "dynamodb-table-encrypted-kms", and "dynamodb-table-encryption-enabled" for Amazon DynamoDB table contents; "efs-encrypted-check" for Amazon Elastic File System (EFS) file systems; "elasticsearch-encrypted-at-rest" for Elasticsearch Service (ES) domains; "rds-snapshot-encrypted" and "rds-storage-encrypted" for Amazon Relational Database Service; "s3-bucket-server-side-encryption-enabled" and "s3-default-encryption-kms" for S3 storage; "sns-encrypted-kms" for Amazon Simple Notification Service (SNS); "redshift-cluster-configuration-check" and "redshift-cluster-kms-enabled" for Redshift clusters; "sagemaker-endpoint-configuration-kms-key-configured" and "sagemaker-notebook-instance-kms-key-configured" for SageMaker. These rules provide a wide range of coverage for many AWS services, especially those most significant to procedures for this technique, resulting in an overall score of Significant.
                                References
                                aws_iot_device_defender AWS IoT Device Defender technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                The following AWS IoT Device Defender cloud-side detection metrics can detect indicators that an adversary may be leveraging compromised AWS IoT devices and the Message Queuing Telemetry Transport (MQTT) protocol for unauthorized data transfer from cloud-side data sources: "Source IP" ("aws:source-ip-address") values outside of expected IP address ranges may suggest that a device has been stolen. "Messages sent" ("aws:num-messages-sent"), "Messages received" ("aws:num-messages-received"), and "Message size" ("aws:message-byte-size") values outside of expected norms may indicate that devices are sending and/or receiving non-standard traffic, which may include data retrieved from cloud storage. The following AWS IoT Device Defender device-side detection metrics can detect indicators that an adversary may be leveraging compromised AWS IoT devices and the Message Queuing Telemetry Transport (MQTT) protocol for unauthorized data transfer from cloud-side data sources: "Bytes in" ("aws:all-bytes-in"), "Bytes out" ("aws:all-bytes-out"), "Packets in" ("aws:all-packets-in"), and "Packets out" ("aws:all-packets-out") values outside of expected norms may indicate that devices are sending and/or receiving non-standard traffic, which may include data retrieved from cloud storage. Coverage factor is partial, since these metrics are limited to IoT device-based collection, resulting in an overall score of Partial.
                                References
                                aws_network_firewall AWS Network Firewall technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to block adversaries from accessing resources such as cloud storage objects by implementing restrictions on which IP addresses and domains can access the resources (e.g., allow lists). However, since cloud storage objects are located outside the virtual private cloud where the AWS Network Firewall protects, the mapping is only given a score of Partial.
                                References
                                aws_rds AWS RDS technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                AWS RDS supports the encryption of the underlying storage for database instances, backups, read replicas, and snapshots using the AES-256 encryption algorithm. This can protect against an adversary from gaining access to a database instance in the event they get access to the underlying system where the database instance is hosted or to S3 where the backups are stored. Furthermore, with AWS RDS, there is a setting that specifies whether or not a database instances is publicly accessible. When public accessibility is turned off, the database instance will not be available outside the VPC in which it was created. As a result, this mapping is given a score of Significant.
                                References
                                aws_s3 AWS S3 technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                S3 provides full control of access via Identity and Access Management (IAM) policies and with its access control lists (ACLs). The S3 Block Public Access feature allows for policies limiting public access to Amazon S3 resources that are enforced regardless of how the resources are created or associated IAM policies. Server-side encryption can be enabled for data at rest and allows for use of S3-managed keys, AWS Key Management Service managed keys, or customer-provided keys.
                                References
                                aws_security_hub AWS Security Hub technique_scores T1530 Data from Cloud Storage Object
                                Comments
                                AWS Security Hub detects improperly secured data from S3 buckets such as public read and write access that may result in an adversary getting access to data in cloud storage. AWS Security Hub provides this detection with the following managed insight. S3 buckets with public write or read permissions AWS Security Hub also performs checks from the AWS Foundations CIS Benchmark that, if implemented, would help towards detecting improperly secured S3 buckets which could result in them being discovered. AWS Security Hub provides this detection with the following check. 3.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes This is scored as Partial because it only detects when S3 buckets have public read or write access and doesn't detect improperly secured data in other storage types (e.g., DBs, NFS, etc.).
                                References