CYFIRMA - Attack Surface - Cloud Weakness High Rule

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This rule detects cloud storage buckets (e.g., AWS S3) that are publicly accessible without authentication. Such misconfigurations can lead to data exfiltration, compliance violations, and reputational damage. The detection is based on Cyfirma's Attack Surface Intelligence.

Attribute Value
Type Analytic Rule
Solution Cyfirma Attack Surface
ID 87cd8b10-90f6-4967-a4a7-2142e848ec8f
Severity High
Status Available
Kind Scheduled
Tactics InitialAccess, Collection, Discovery, Exfiltration
Techniques T1087, T1087.004
Required Connectors CyfirmaAttackSurfaceAlertsConnector
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
CyfirmaASCloudWeaknessAlerts_CL ? ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Cyfirma Attack Surface