AWS VPC Flow Logs

Cloud & SaaSNetwork TrafficAWSVPC Flow LogsCloud Control PlaneSIEM / Log Aggregator

Location

VPC Flow Logs delivered to CloudWatch Logs, S3, or Kinesis Data Firehose

Description

Network-flow records for Elastic Network Interfaces (ENIs) covering accepted and rejected traffic with source and destination addresses, ports, protocol, packets, bytes, action, and log status.

Forensic Value

VPC Flow Logs are the core AWS network evidence source for confirming connections between instances, containers, NAT gateways, and external infrastructure. They support exfiltration scoping, lateral-movement analysis, and identification of unmanaged assets that contacted attacker infrastructure. Even when packet capture is unavailable, flow logs establish who talked to whom, when, and at what volume.

Tools Required

AWS ConsoleAWS CLIAthenaCloudWatch Logs InsightsSIEM

Collection Commands

AWS CLI

aws ec2 describe-flow-logs --output json > vpc_flow_log_configs.json

AWS CLI

aws logs filter-log-events --log-group-name <vpc-flow-log-group> --start-time 1709251200000 --end-time 1709856000000 > vpc_flow_events.json

AWS CLI

aws s3 cp s3://<log-bucket>/AWSLogs/<account-id>/vpcflowlogs/ ./vpc-flow-logs/ --recursive

Collection Constraints

  • VPC Flow Logs provide network metadata only and never include packet payloads or decrypted application content.
  • Coverage depends on flow logging being enabled for the relevant VPCs, subnets, or ENIs before the incident window.

MITRE ATT&CK Techniques

T1041T1048T1071T1021

References

Related Blockers

Critical Logs Rotated/Overwritten Before Collection

Key log files (Security EVTX, web server access logs, syslog) have been rotated out or overwritten due to aggressive retention settings, high volume, or attacker manipulation. The evidence window for those sources is now closed.

SIEM Not Ingesting Relevant Log Sources

The SIEM does not ingest logs from the affected systems, applications, or network segments. Correlation, alerting, and historical search capabilities are unavailable for the evidence sources most relevant to this incident.

Legal Requesting Preservation Conflicts with Containment

Legal counsel has issued a preservation hold requiring that certain systems, mailboxes, or data stores remain untouched. This directly conflicts with containment actions like reimaging hosts, resetting accounts, or blocking network segments.

Attacker Used Timestomping, Log Clearing, or Other Anti-Forensics

Evidence of deliberate anti-forensic activity has been found: timestamps modified, event logs cleared, prefetch/shimcache wiped, or tools designed to defeat forensic analysis were executed. Standard timeline analysis may be unreliable.

Cloud or Container Logging Coverage Missing

The investigation depends on cloud-control-plane or container telemetry that was never enabled, was retained too briefly, or was routed to an unavailable destination. This creates blind spots around identity misuse, cluster administration, and workload behavior.

Host Wiped Before Forensic Acquisition

The compromised host has been zeroed or securely wiped (DBAN, `dd if=/dev/zero`, `sdelete`, `shred`) before forensic imaging could begin. Traditional filesystem-carving techniques recover limited content; the investigation must pivot to peer-host artifacts, network telemetry, and cloud/identity records that survived the wipe.

Evidence Chain of Custody Compromised

Evidence handling has gaps or integrity issues (missing hash verification, broken custody log, unauthorized access to evidence storage, transfers without documented handoffs). Evidence may still be technically useful but legal admissibility is compromised; pivot to secondary preservation and early legal assessment.

Law Enforcement Requested Investigation Pause

A law-enforcement agency (FBI, Secret Service, Europol, national police cybercrime unit) has requested that the organization pause or slow-walk active investigation, containment, or notification steps while they pursue their own investigation. This creates tension between legal obligations to customers/regulators and cooperation with LEA.

Deep Anti-Forensics: Timestomping, Rootkits, Secure Delete

The attacker has employed anti-forensic techniques: timestomping ($MFT/$STANDARD_INFORMATION manipulation), log clearing (Security.evtx wiped, journalctl truncated), NTFS alternate data stream hiding, rootkits, file-attribute masking, or secure-delete of specific indicators. Standard forensic analysis produces incomplete or misleading results.

Investigation Requires Air-Gapped Network Access

The affected systems are on an isolated network segment with no connectivity to standard IR tooling (EDR management plane, SIEM, evidence-transfer channels). Acquisition and analysis must happen via physical media or through carefully-controlled trusted-transfer workflows that do not breach the air gap.

Evidence Spans Multiple Jurisdictions with Conflicting Laws

Affected systems or data span multiple countries with differing data-protection, breach-notification, and cross-border transfer laws (GDPR, data-residency rules, PIPL, LGPD, state-level US laws). Acquisition and analysis that is lawful in one jurisdiction may be unlawful in another. Engage legal counsel early and plan in-region processing.