AWS VPC Flow Logs

Cloud & SaaSNetwork TrafficAWSVPC Flow LogsCloud Control PlaneSIEM / Log Aggregator

Location

VPC Flow Logs delivered to CloudWatch Logs, S3, or Kinesis Data Firehose

Description

Network-flow records for Elastic Network Interfaces (ENIs) covering accepted and rejected traffic with source and destination addresses, ports, protocol, packets, bytes, action, and log status.

Forensic Value

VPC Flow Logs are the core AWS network evidence source for confirming connections between instances, containers, NAT gateways, and external infrastructure. They support exfiltration scoping, lateral-movement analysis, and identification of unmanaged assets that contacted attacker infrastructure. Even when packet capture is unavailable, flow logs establish who talked to whom, when, and at what volume.

Tools Required

AWS ConsoleAWS CLIAthenaCloudWatch Logs InsightsSIEM

Collection Commands

AWS CLI

aws ec2 describe-flow-logs --output json > vpc_flow_log_configs.json

AWS CLI

aws logs filter-log-events --log-group-name <vpc-flow-log-group> --start-time 1709251200000 --end-time 1709856000000 > vpc_flow_events.json

AWS CLI

aws s3 cp s3://<log-bucket>/AWSLogs/<account-id>/vpcflowlogs/ ./vpc-flow-logs/ --recursive

Collection Constraints

  • VPC Flow Logs provide network metadata only and never include packet payloads or decrypted application content.
  • Coverage depends on flow logging being enabled for the relevant VPCs, subnets, or ENIs before the incident window.

MITRE ATT&CK Techniques

T1041T1048T1071T1021

References

Related Blockers