Amazon ECR CloudTrail and Registry Events

Cloud & SaaSCloud InfrastructureAWSAmazon ECRCloud Control PlaneSIEM / Log Aggregator

Location

CloudTrail events for ecr.amazonaws.com plus repository and image metadata from ECR APIs

Description

Registry activity for Amazon Elastic Container Registry including repository creation, policy changes, image push and pull activity, authentication-related events, and image inventory metadata.

Forensic Value

ECR events explain how attacker-controlled images entered the environment or how private repositories were enumerated and accessed. They are particularly valuable in supply-chain and container-cluster incidents because they tie image usage back to specific identities, source IPs, and repository mutations that can later be correlated with cluster deployment activity.

Tools Required

AWS ConsoleAWS CLICloudTrailSIEM

Collection Commands

AWS CLI

aws cloudtrail lookup-events --lookup-attributes AttributeKey=EventSource,AttributeValue=ecr.amazonaws.com --output json > ecr_cloudtrail_events.json

AWS CLI

aws ecr describe-repositories --output json > ecr_repositories.json

AWS CLI

aws ecr describe-images --repository-name <repository-name> --output json > ecr_repository_images.json

Collection Constraints

  • ECR audit evidence explains registry activity, but investigators still need cluster or host evidence to prove image execution on workloads.
  • Historical visibility depends on CloudTrail retention and whether registry metadata was preserved before cleanup or deletion.

MITRE ATT&CK Techniques

T1525T1552.001T1550.001

Related Blockers