Amazon EC2 / EBS / AMI / User Data Metadata

Cloud & SaaSCloud InfrastructureAWSAmazon EC2Cloud Control Plane

Location

EC2 instance, volume, image, metadata-options, and user-data configuration via EC2 APIs and IMDS

Description

Instance and storage configuration metadata including instance profile, security groups, attached volumes, AMI lineage, user-data scripts, IMDS configuration, launch templates, and snapshot relationships.

Forensic Value

EC2 metadata explains how a workload was launched, what credentials it inherited, what bootstrap scripts ran, and which EBS volumes preserve evidence. It also reveals dangerous user-data scripts, IMDS exposure, cross-account AMI usage, and launch-template tampering that can establish persistence or explain how attacker tooling was deployed at scale.

Tools Required

AWS ConsoleAWS CLIEC2 IMDSv2 utilities

Collection Commands

AWS CLI

aws ec2 describe-instances --instance-ids i-xxxxxxxxxxxxxxxxx > ec2_instance_metadata.json

AWS CLI

aws ec2 describe-volumes --filters Name=attachment.instance-id,Values=i-xxxxxxxxxxxxxxxxx > ec2_attached_volumes.json

AWS CLI

aws ec2 describe-instance-attribute --instance-id i-xxxxxxxxxxxxxxxxx --attribute userData > ec2_user_data.json

IMDSv2

TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600"); curl -H "X-aws-ec2-metadata-token: $TOKEN" http://169.254.169.254/latest/dynamic/instance-identity/document > ec2_instance_identity_document.json

Collection Constraints

  • Metadata is highly time-sensitive because launch templates, user data, and attached resources can be modified quickly during response.
  • This evidence explains configuration and credential exposure but does not replace disk, memory, or workload-level acquisition.

MITRE ATT&CK Techniques

T1578T1552.005T1078.004