turbot/tailpipe-mod-aws-cloudtrail-log-detections

Query: s3_bucket_policy_granted_public_access

Usage

powerpipe query aws_cloudtrail_log_detections.query.s3_bucket_policy_granted_public_access

Tailpipe Tables

SQL

select
tp_timestamp as timestamp,
string_split(event_source, '.')[1] || ':' || event_name as operation,
request_parameters ->> 'bucketName' as resource,
user_identity.arn as actor,
tp_source_ip as source_ip,
tp_index as account_id,
aws_region as region,
tp_id as source_id,
*
from
aws_cloudtrail_log
where
event_source = 's3.amazonaws.com'
and event_name = 'PutBucketPolicy'
and (json_contains(request_parameters -> 'bucketPolicy', '{"Principal": "*"}')
or json_contains(request_parameters -> 'bucketPolicy', '{"Principal": {"AWS": "*"}}'))
and json_contains(request_parameters -> 'bucketPolicy', '{"Effect": "Allow"}')
and error_code is null
order by
event_time desc;

Detections

The query is being used by the following detections: