AWS - Disable S3 Bucket Public Access
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook disables public access AWS S3 bucket. It is triggered by an incident in Microsoft Sentinel and perform the following actions: 1. Get the Bucket Name from incident entities. 2. Call the AWS IAM Function App Connector to disable public access of S3 bucket. 3. Add a comment to the incident with the result of the action.
Additional Documentation
📄 Source: Playbooks/AWS-DisableS3BucketPublicAccess/readme.md
AWS-DisableS3BucketPublicAccess
Summary
When a new Sentinel incident is created, this playbook gets triggered and performs the following actions:
- Get the Bucket Name from incident entities.
- Call the AWS IAM Function App Connector to disable public access of S3 bucket.
- Add a comment to the incident with the result of the action.



Prerequisites
- Prior to the deployment of this playbook, AWS IAM Function App Connector needs to be deployed under the same subscription.
- Refer to AWS IAM Function App Connector documentation to obtain AWS Access Key ID and Secret Access Key.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name: Enter the playbook name here

Post-Deployment instructions
a. Authorize connections for Playbook
Once deployment is complete, authorize each connection.
- Click the Microsoft Sentinel connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
- Repeat steps for other connections
- In Microsoft sentinel, analytical rules should be configured to trigger an incident that contains Cloud Application instance. In the Entity mapping section of the analytics rule creation workflow, Cloud Application instance should be mapped to Name identifier of the Cloud Application entity type. Check the documentation to learn more about mapping entities.
- Configure the automation rules to trigger the playbook. Check the documentation to learn more about automation rules.
c. Assign Playbook Microsoft Sentinel Responder Role
- Select the Playbook (Logic App) resource
- Click on Identity Blade
- Choose System assigned tab
- Click on Azure role assignments
- Click on Add role assignments
- Select Scope - Resource group
- Select Subscription - where Playbook has been created
- Select Resource group - where Playbook has been created
- Select Role - Microsoft Sentinel Responder
- Click Save
References
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to AWS_IAM