Skip to main content

AWS S3 bucket configured with short retention period

ID:aws_s3_short_bucket_retention_period
Data type:AWS CloudTrail
Severity:
Informational
-
Medium
MITRE ATT&CK:TA0040:T1485.001

Description

AlphaSOC detected that an AWS S3 bucket has been configured with an unusually short retention period. This configuration uses S3 lifecycle policies to automatically delete objects after a specified time frame. Threat actors may exploit this capability to destroy evidence of their activities or to cause data loss by ensuring objects are automatically removed before they can be backed up or analyzed.

Impact

A shortened retention period on AWS S3 buckets can result in permanent data loss and compromise forensic investigation capabilities. This configuration may prevent security teams from accessing historical data needed for incident response, compliance audits, or breach investigations. Critical business data could be permanently lost if retention periods are reduced below organizational requirements.

Severity

SeverityCondition
Informational
AWS S3 bucket configured with short retention period
Low
AWS S3 bucket unexpectedly configured with short retention period
Medium
AWS S3 bucket configured with short retention period in a suspicious way

Investigation and Remediation

Immediately review the AWS S3 bucket lifecycle policies and retention settings to verify if the changes were authorized. If unauthorized, restore the retention period to organizational standards and consider implementing preventive controls such as S3 Object Lock or bucket policies that restrict lifecycle modifications. Enable versioning and MFA delete on critical buckets to maintain data integrity even if retention policies are altered.