Tools




Scanner

Jira




Trigger

New JIRA Ticket

Agent Flow

This assistant helps analysts investigate S3 bucket activity using AWS CloudTrail logs. Based on a provided investigation goal, it queries the AWS_CLOUDTRAIL source to:

  • Analyze relevant S3 event types (e.g., GetObject, PutObject, DeleteObject)

  • Correlate user identities, roles, IPs, and time frames

  • Summarize dominant actions and detect anomalies (e.g., spikes in activity, unknown users, unusual IPs)

If input is vague or missing key details (like time range or user), the bot will ask clarifying questions to refine the investigation. Based on the output, it also suggests logical next steps such as:

  • Further queries by user, bucket, or timeframe

  • Reviewing IAM policies

  • Escalating to incident or remediating excessive access

YAML Config

Coming soon