analyst security skill risk: medium
Cloud Storage Access Anomaly Detector
Provides instructions, prerequisites, and steps to query cloud storage logs, build access baselines, detect anomalies such as after-hours access or bulk downloads, and generate pri…
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
---
name: analyzing-cloud-storage-access-patterns
description: "Detect abnormal access patterns in AWS S3, GCS, and Azure Blob Storage by analyzing CloudTrail Data Events, GCS"
---
# Analyzing Cloud Storage Access Patterns
## When to Use
- When investigating security incidents that require analyzing cloud storage access patterns
- When building detection rules or threat hunting queries for this domain
- When SOC analysts need structured procedures for this analysis type
- When validating security monitoring coverage for related attack techniques
## Prerequisites
- Familiarity with cloud security concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
## Instructions
1. Install dependencies: `pip install boto3 requests`
2. Query CloudTrail for S3 Data Events using AWS CLI or boto3.
3. Build access baselines: hourly request volume, per-user object counts, source IP history.
4. Detect anomalies:
- After-hours access (outside 8am-6pm local time)
- Bulk downloads: >100 GetObject calls from single principal in 1 hour
- New source IPs not seen in the prior 30 days
- ListBucket enumeration spikes (reconnaissance indicator)
5. Generate prioritized findings report.
```bash
python scripts/agent.py --bucket my-sensitive-data --hours-back 24 --output s3_access_report.json
```
## Examples
### CloudTrail S3 Data Event
```json
{"eventName": "GetObject", "requestParameters": {"bucketName": "sensitive-data", "key": "financials/q4.xlsx"},
"sourceIPAddress": "203.0.113.50", "userIdentity": {"arn": "arn:aws:iam::123456789012:user/analyst"}}
```
INPUTS
- bucket REQUIRED
target cloud storage bucket
e.g. my-sensitive-data
- hours-back REQUIRED
lookback period in hours
e.g. 24
- output REQUIRED
output file path
e.g. s3_access_report.json
REQUIRED CONTEXT
- CloudTrail Data Events or equivalent logs
- bucket name
- time window
OPTIONAL CONTEXT
- Python environment
- test/lab access
TOOLS REQUIRED
- code_execution
EXPECTED OUTPUT
- Format
- structured_report
- Constraints
- include prioritized findings
- follow the 5-step analysis process
- use provided anomaly rules
EXAMPLES
Includes one CloudTrail S3 Data Event JSON example.
CAVEATS
- Missing context
- Exact structure or template for the prioritized findings report
- Instructions or libraries for querying GCS and Azure Blob Storage
- Ambiguities
- Description sentence is truncated after 'GCS'
QUALITY
- OVERALL
- 0.60
- CLARITY
- 0.70
- SPECIFICITY
- 0.55
- REUSABILITY
- 0.65
- COMPLETENESS
- 0.50
IMPROVEMENT SUGGESTIONS
- Complete the truncated description sentence.
- Add steps or code examples for GCS and Azure in the Instructions section.
- Specify required output fields or schema for s3_access_report.json.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR ANALYST
- CTI Analyst for Cybersecurity Project Revisionsanalystsecurity
- Malware Sandbox Evasion Techniques Analyzeranalystsecurity
- NetFlow Pandas Traffic Baselininganalystsecurity
- Data Staging Exfiltration Threat Hunteranalystsecurity
- NetFlow Security Anomaly Analyzeranalystsecurity
- PowerShell EVTX Script Block Analyzeranalystsecurity
- Domain Fronting C2 Traffic Detectoranalystsecurity
- DNS-Based Persistence Hunting Proceduresanalystsecurity
- Heap Spray Exploitation Memory Dump Analyzeranalystsecurity
- PowerShell Empire Event Log Analyzeranalystsecurity
- Anomalous PowerShell Execution Hunting Guideanalystsecurity
- Zeek Conn.log Beaconing Pattern Detectoranalystsecurity
- API Gateway Access Log Attack Analyzeranalystsecurity
- Android APK Malware Static Analysisanalystsecurity
- Kubernetes Audit Log Security Analyzeranalystsecurity
- Office 365 Audit Log Compromise Analyzeranalystsecurity
- Academic Research Brainstorm and Improvement Analyzeranalystresearch
- ML Missing Values Treatment Pipelineanalystanalysis
- Quantitative Sports Betting Edge Evaluatoranalystanalysis
- B2B Manufacturing Homepage Tech-SEO Diagnosticanalystanalysis
- OSINT US Surveillance Source Investigatoranalystresearch
- Curated Compendium of Cuckold BNWO Websitesanalystresearch
- US Indices Market News and Sentiment Reporteranalystfinance
- Technical Academic Paper Revieweranalystanalysis
- UX Landing Page Conversion Analyzeranalystanalysis