• IAM Abuse
    • Storage Abuse
    • Compute Abuse
  • science Research
    • CloudTrail Rules
    • Splunk Rules
    • Sigma Rules
    • Technique → Detection
    • IAM Design
    • Monitoring Strategy
    • Adversary Platform
    • Detection Generator
    • GitHub
    • Twitter / X
    • RSS
  • to navigate
  • to select
  • to close
    • Home
    • Cloud Attacks
    On this page
    • Cloud Attacks
      • Scope
      • Structure
      • Related Sections
    • Cloud Attacks
      • Scope
      • Structure
      • Related Sections
    security

    Cloud Attacks

    AWS attack techniques across IAM, S3, and EC2.

    person

    IAM Abuse

    AWS IAM exploitation techniques for privilege escalation and persistence.

    storage

    Storage Abuse

    AWS S3 bucket abuse and data exfiltration techniques.

    computer

    Compute Abuse

    AWS EC2, Lambda, and ECS abuse techniques.


    © 2026 Detecting.Cloud. AWS Security Detection Research.