...
Expand | ||
---|---|---|
| ||
Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator. This alert filters CreateKey and PutKeyPolicy CloudTrail events that come from the KMS service. It then parses the diferent principals and actions from the requestParameters (the alert will consider only the first five principals and actions, the following will be disregarded). The alert triggers when one of the pairs meets the following criteria:
Source table → |
Expand | ||
---|---|---|
| ||
Scanning from an ECR container detected at least one critical risk finding. This alert filters cloudtrail DescribeImageScanFindings events that come from the ECR service then filter events that have the string CRITICAL within the response parameters. Source table → |
AWS CloudWatch alerts
Expand | ||
---|---|---|
| ||
This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS. Source table → |
...