Amazon EC2 / EBS / AMI / User Data Metadata
Cloud & SaaSCloud InfrastructureAWSAmazon EC2Cloud Control Plane
Location
EC2 instance, volume, image, metadata-options, and user-data configuration via EC2 APIs and IMDSDescription
Instance and storage configuration metadata including instance profile, security groups, attached volumes, AMI lineage, user-data scripts, IMDS configuration, launch templates, and snapshot relationships.
Forensic Value
EC2 metadata explains how a workload was launched, what credentials it inherited, what bootstrap scripts ran, and which EBS volumes preserve evidence. It also reveals dangerous user-data scripts, IMDS exposure, cross-account AMI usage, and launch-template tampering that can establish persistence or explain how attacker tooling was deployed at scale.
Tools Required
AWS ConsoleAWS CLIEC2 IMDSv2 utilities
Collection Commands
AWS CLI
aws ec2 describe-instances --instance-ids i-xxxxxxxxxxxxxxxxx > ec2_instance_metadata.json
AWS CLI
aws ec2 describe-volumes --filters Name=attachment.instance-id,Values=i-xxxxxxxxxxxxxxxxx > ec2_attached_volumes.json
AWS CLI
aws ec2 describe-instance-attribute --instance-id i-xxxxxxxxxxxxxxxxx --attribute userData > ec2_user_data.json
IMDSv2
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600"); curl -H "X-aws-ec2-metadata-token: $TOKEN" http://169.254.169.254/latest/dynamic/instance-identity/document > ec2_instance_identity_document.json
Collection Constraints
- •Metadata is highly time-sensitive because launch templates, user data, and attached resources can be modified quickly during response.
- •This evidence explains configuration and credential exposure but does not replace disk, memory, or workload-level acquisition.
MITRE ATT&CK Techniques
T1578T1552.005T1078.004