- Malicious actor probes for access:
An attacker uses stolen credentials to enumerate S3 buckets and locate sensitive configurations or data.
- Administrator troubleshooting:
A legitimate admin lists buckets and objects during a system migration, inadvertently triggering the detection.