Overview
Amazon Web Services (AWS) is one of the largest cloud providers out there and as such requires organizations to protect themselves with cloud security monitoring.
SciSec’s content contains dozens of AWS detections so your organization can monitor your AWS infrastructure, look for areas of risk, or help respond to threats as they emerge. The detections are for AWS products and services Cloudtrail, Cloudwatch, and VPC.
Check the different AWS-related detections we provide in the table below, grouped by categories:
...
Expand |
---|
title | AWS CloudTrail - IAM User Generating AccessDenied Errors Across Multiple Actions |
---|
| This alert detects users that received the errorCode value AccessDenied when trying to perform different actions within a short period of time. This could indicate that a user is trying to enumerate their permissions in their AWS account.
This alert filters by events where the errorCode AccessDenied is present and groups every 5 minutes by user arn and aws account.SecOpsAWSOpsWorksDescribePermissionsEvent |
|
The DescribePermissions event retrieves a description about permissions for a specified stack. This could be used by an attacker to collect information for further attacks. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsUpdateSAMLProvider |
---|
|
Detects actions that update SAML the provider configuration Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS Console Login Without MFA |
---|
| A successful AWS console login without MFA was detected. AWS security best practices recommend enabling this security measure for console access login.
This alert filters CloudTrail events from signin.amazonaws.com with ConsoleLogin as eventName, a success response, and the MFA value not enabled. |
This search provides specific information to detect abnormal access or potential credential hijack or forgery, specially in federated environments using SAML protocol inside the perimeter or cloud provider Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudTrail - New UserPoolClient Created |
---|
| This alert detects when a UserPoolClient entity is created. These types of entities SecOpsAWSPermissionsBoundaryLiftedtoUser |
|
It was detected that a permission boundary has been lifted against an IAM user. This action could be used by an attacker to perform unauthenticated API operations.This alert filters CloudTrail events from cognito-idp.amazonaws.com with CreateUserPoolClient as eventNameescalate privileges within an AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSMultipleFailedConsoleLoginsFromASourceIP |
---|
|
The Describe permissions event retrieves a description of permissions for a specified stack. This could be used by an attacker to collect information for further attacks. Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudTrail - Customer Master Key Disabled or Scheduled for Deletion |
---|
| Detects when a Customer Master Key (CMK) is disabled or scheduled for deletionSecOpsAWSIAMPolicyAppliedToGroup |
|
It was detected that a policy had been attached to a group. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Database Snapshot Created |
---|
| Creating DB snapshots is an efficient way for an attacker to begin downloading a target database. These signals should be considered around the context of other signals that may indicate data theft is in progressSecOpsAWSLoggingConfigurationChangeObservedDeleteTrail |
|
A trail within the Cloudtrail service has been deleted. This event should be checked since it could indicate that an attacker may be trying to hide suspicious activity within an AWS account. Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudTrail - EC2 Access Key Action Detected |
---|
| This alert detects actions that create, import, and delete access keys to EC2.SecOpsAwsECRContainerUploadOutsideBusinessHours |
|
Upload of a new ECR container was performed outside normal business hours. This is during weekend or between 20:00 and 8:00 Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudTrail - GetSecretValue from non-Amazon IP |
---|
| This alert detects action GetSecretValue for source IPs that do not belong to an Amazon instance IP spaceSecOpsAWSDetectUsersCreatingKeysWithEncryptPolicyWithoutMFA |
|
Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsEc2KeyAction |
---|
|
Detects any actions observed that create, import, or delete access keys to EC2. Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
This alert filters CloudTrail events with DeleteTrail as eventNametitle | AWS CloudTrail - Logging Configuration Change Observed (DeleteTrail) |
---|
| This alert is triggered when a trail within the CloudTrail service is deleted. This event should be checked since it could indicate that an attacker is trying to hide suspicious activity within an AWS account.
| SecOpsCDIocIpSuspiciousAWSData |
---|
|
This search looks for Collective Defense matches in AWS data. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSCreateloginprofile |
---|
|
Detects if a login has been performed by a user which has been created in the last 24 hours and checks if the user creation and the login has been performed from the same IP. This behaviour could indicate a privilege escalation attempt. Source table → cloud.office365.siem_agent_alertaws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Logging Configuration Change Observed (StopLogging) |
---|
| A trail within the CloudTrail service has been stopped. This event SecOpsAWSIAMPolicyAppliedToUser |
|
It was detected that a policy has been attached to a role, these kind of events should be checked since it they could indicate that an attacker may be trying to hide suspicious activity within an AWS account.This alert filters CloudTrail events with StopLogging as eventNamebe granting excessive access permissions to AWS services or resources. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsVpcLargeOutboundTrafficBlock |
---|
|
Actions observed as blocked for sending large amounts of data from AWS out to the internet. Source table → cloudvpc.aws.cloudtrail flow |
Expand |
---|
title | SecOpsAWSCreateAccessKey |
---|
|
This search looks for AWS CloudTrail | - Multiple Failed Console Logins From a Source IPThis alert is triggered when multiple events where a user, who already has permission to create access keys, makes an API call to create access keys for a second user. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSMultipleFailedConsoleLogins |
---|
|
Multiple failed login attempts from the same user are were detected. This could indicate that an attacker is could be trying to brute - force access to that specific user account. This alert filters CloudTrail events with ConsoleLogin as eventName, errorMessage equal to Failed authentication, and an unsuccessful response. Then, groups by eventName, requestParameters, userIdentity_arn, and userIdentity_accountId and triggers the alert when the count is bigger than 5. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - OpsWorks Describe Permissions Event |
---|
|
The DescribePermissions event retrieves the descriptions of permissions for a specified stack. This could be used by an attacker to collect information for further attacks. This alert filters CloudTrail events from opsworks.amazonaws.com source with DescribePermissions as eventName. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Permissions Boundary Lifted (Role) |
---|
|
This alert is triggered when a permission boundary is lifted against an IAM role. This action could be used by an attacker to escalate privileges within an AWS account. This alert filters by CloudTrail events from iam.amazonaws.com with DeleteRolePermissionsBoundary as eventName. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Permissions Boundary Lifted (User) |
---|
|
This alert is triggered when a permission boundary is lifted against an IAM user. This action could be used by an attacker to escalate privileges within an AWS account. This alert filters by CloudTrail events from iam.amazonaws.com with DeleteUserPermissionsBoundary as eventName.Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsVpcLargeFile |
---|
|
Detects possible large file being moved via AWS VPC logs. Source table → vpc.aws.flow |
Expand |
---|
title | SecOpsAWSPermissionsBoundaryModifiedToUser |
---|
|
A Permission Boundary has been modified for a role. This could allow granting all the actions in the permissions of the policies attached to that role. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSUpdateloginprofile |
---|
|
A user has updated the login profile of a different user. This could indicate that a privilege escalation is being performed leveraging the user which login profile has been updated. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Reconnaissance Related Event |
---|
| Analytical detection of reconnaissance type behavior from AWS CloudTrail logsSecOpsAWSDetectStsAssumeRoleAbuse |
|
Suspicious use of "AssumedRole". This type of tokens could be used by an attacker in order perform privilege escalation or lateral movements. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - SQS List Queues Event |
---|
| This alert detects rare ListQueues events from AWS SQSSecOpsAWSIAMAssumeRolePolicyBruteForce |
|
Detection of events with errorCode "MalformedPolicyDocumentException". A malformed policy document exception occurs in instances where roles are attempted to be assumed, or brute forced. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Schedule Key Deletion in KMS |
---|
| Detects scheduled deletion of KMS keys. |
Detects actions taken to create new IAM roles in AWS Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Network Access Control List Deleted |
---|
| Network ACL was deleted, this could indicate that an attacker is downgrading security access of a network instance.
This detection filters CloudTrail events with DeleteNetworkAclEntry as eventNameSecOpsAWSIAMUserGeneratingAccessDeniedErrorsAcrossMultipleActions |
|
This alert checks filters by events where the errorCode AccessDenied is present and groups each 5 minutes by user arn and aws account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Secrets Manager Sensitive Admin Action Observed |
---|
| Scanning from an ECR container detected at least one high-risk finding.
This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH within the response parameters |
A successful root account login was detected. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSSecretsManagerSensitiveAdminActionObserved | AWS CloudTrail - Sensitive Activity in KMS |
---|
|
Analytics detection about KMS key enable/disable actionsAny modification action performed against the AWS Secrets Administrative service should be reviewd. This could be an indicator of suspicious activity being carried out by a hostile entity. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS Detect Role Creation |
---|
| Detects actions taken to create new IAM roles in AWSSecOpsAwsCloudTrailReconEvent |
|
Analytical detection of a reconnaissance type behavior from AWS CloudTrail logs. Source table → cloud.aws.cloudtrail |
Expand |
---|
Expand |
---|
title | AWS CloudTrail - Detect Users Creating Keys With Encrypt Policy Without MFA |
---|
|
Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator.
This alert filters CreateKey and PutKeyPolicy CloudTrail events that come from the KMS service. It then parses the diferent principals and actions from the requestParameters (the alert will consider only the first five principals and actions, the following will be disregarded). The alert triggers when one of the pairs meets the following criteria:
The action contains the string kms:* or kms:Encrypt
The principal contains the string AWS:*title | AWS CloudTrail - AWS Detect STS Assume Role Abuse |
---|
|
Suspicious use of AssumedRole. This type of token could be used by an attacker in order to perform privilege escalation or lateral movements. This alert filters CloudTrail events with AssumedRole parameter equal to AssumedRole and userIdentity_sessionContext equal to Role. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS Detect Permanent Key Creation |
---|
|
Detects actions observed that create, import, and delete access keys to EC2. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS Detect Users with KMS Keys Performing Encryption S3 |
---|
|
Detects actions taken by users to encrypt S3 buckets using KMS keys. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS Network Access Control List Created with All Open Ports |
---|
|
The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS SAML Access by Provider User and Principal |
---|
|
This search provides specific information to detect abnormal access or potential credential hijack or forgery, especially in federated environments using SAML protocol inside the perimeter or cloud provider. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS ECR Container Scanning Findings High |
---|
|
This alert triggers when at least one high risk is detected after scanning an ECR container. This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH in the response parameters. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS ECR Container Scanning Findings Low Informational Unknown |
---|
|
Scanning from an ECR container detected at least one LOW or UNDEFINED risk finding. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS ECR Container Scanning Findings Medium |
---|
|
This alert triggers when at least one medium risk is detected after scanning an ECR container. This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string MEDIUM in the response parameters. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS ECR Container Upload Outside Business Hours |
---|
|
This alert is triggered when a new ECR container is uploaded outside normal business hours (weekend or between 20:00-8:00) This alert filters CloudTrail PutImage events that come from the ECR service, then filters events using the eventdate parameter, triggering the alert when this value is between 20:00 and 08:00 hours or during weekends. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS ECR Container Upload Unknown User |
---|
|
This alert is triggered when a new ECR container is uploaded by an unknown user. It is possible to include a list of users to not monitor in the SecOpsGWL lookup, using the ARN as a key. This alert filters PutImage CloudTrail events that come from an ECR service. The alert triggers when the user performing the action is not registered in the SecOpsGWL lookup. Users must be registered in the lookup using the ARN as a key. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS IAM Assume Role Policy Brute Force |
---|
|
Detection of events with errorCode value MalformedPolicyDocumentException. This alert could indicate that someone is trying to identify a role name. This alert filters CloudTrail events that come from the IAM service and have errorCode equal to MalformedPolicyDocumentException, then groups by common parameters and counts. The alert will trigger when the count is more than 1. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - IAM Policy Applied to a Group |
---|
|
This alert lets you know that policy has been attached to a group. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources. This detection filters by CloudTrail events with PutGroupPolicy as eventName. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - IAM Policy Applied to Role |
---|
|
This alert lets you know that a policy has been attached to a role. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - IAM Policy Applied to User |
---|
|
This alert lets you know that a UserPoolClient entity has been created. These types of entities could be used by an attacker to perform unauthenticated API operations. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS IAM DeletePolicy |
---|
|
This alert lets you know that an action to delete a policy was performed. This should be checked since it could undermine the security configuration of the AWS environment. This alert filters DeletePolicy CloudTrail events that come from the IAM service and has request parameters attached to them. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS IAM Successful Group Deletion |
---|
|
Deleting an IAM group is not a dangerous action by itself, but correlated with other events such as recent user or group creations could indicate malicious behaviors. This alert filters DeleteGroup CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives and must have request parameters attached. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS SetDefaultPolicyVersion |
---|
|
This alert detects AWS CloudTrail events where a user has set a default policy version. Attackers have been known to use this technique for Privilege Escalation in case the previous versions of the policy had permission to access more resources than the current version of the policy. This alert filters SetDefaultPolicyVersion CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - AWS UpdateLoginProfile |
---|
|
This alert detects when a user updates the login profile of a different user. This could indicate that a privilege escalation is being performed leveraging the user whose login profile has been updated. This alert filters UpdateLoginProfile CloudTrail events that come from the IAM service. Two additional filters are applied: userAgent has to be equal to console.amazonaws.com in order to filter only actions performed through the console, and errorCode must be null to avoid false positives. Then, it groups and extracts the userName of the login profile being updated and triggers the alert if the user performing the action is not the same as the one extracted from the request parameters. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - New Container Uploaded To AWS ECR |
---|
|
This alert detects users uploading new images to AWS Elastic Container Registry (ECR). Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudWatch - AWS Detect STS Get Session Token Abuse |
---|
|
This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS |
---|
|
This alert detects actions that send large amounts of data from AWS out to the internet. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Root Console Successful Login Observed |
---|
|
This alert detects successful root account logins. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices. This detection filters CloudTrail events with ConsoleLogin as eventName and userName equal to root. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - IAM CreateUser Action Observed |
---|
|
This alert detects when a new user is created. This should be checked since an attacker could have created this user to gain persistence on the AWS account. This alert detects new logs whose eventName is CreateUser and its requestParameters are not null. This indicates that a new user was created in the corresponding AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Multiple Failed Console Logins |
---|
|
Multiple failed login attempts from the same user were detected. This could indicate an attacker could be trying to access that specific user account by brute force. This detection filters by CloudTrail events with ConsoleLogin as eventName, errorMessage equal to failed authentication and a non-success response. It then groups by eventName, requestParameters, userIdentity_arn and userIdentity_accountId and triggers the alert when the count is greater than five. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Public S3 Bucket Exposed |
---|
|
A request to set a new ACL to a bucket and to make it public has been detected. Although this could be a legitimate action, It should be reviewed. This alert filters PutBucketAcl CloudTrail events that come from the S3 service. It then extracts each pair of URI and Permission from the raw event message and checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and the permission is READ, READ_ACP, WRITE, WRITE_ACP or FULL_CONTROL. The alert will trigger if any of the pairs checked meet both requirements. This alert will only extract the first five permissions and URIs of a message. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Logging Configuration Change Observed Remove Tags |
---|
|
This detection filters by CloudTrail events with RemoveTags as eventName. Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Create Policy Version To Allow All Resources |
---|
|
This search looks for AWS CloudTrail events where a user created a policy version that allows them to access any resource in their account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Create Access Key |
---|
|
This search looks for AWS CloudTrail events where a user who already has permission to create access keys, makes an API call to create access keys for another user. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | AWS CloudTrail - Excessive Security Scanning |
---|
|
A large number of actions performed which start with Describe have been performed by a single user. This could indicate this user is trying to enumerate the AWS account. This alert filters CloudTrail events in which eventName starts with one of the following strings: Describe, Get or List. It groups by IP address, account and source name. Then it collects a list of the diferent event names included in each entry and triggers the alert if the list is greater than 50. Source table → cloud.aws.cloudtrail |
SecOpsAWSPublicS3BucketExposed |
|
This alert filters PutBucketAcl cloudtrail events that come from the S3 service. The alert then extracts each URI and Permission pair from the raw event message. The alert then checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and if the permission is READ, READ_ACP, WRITE, WRITE_ACP, or FULL_CONTROL. The alert will trigger if any of these pairs meet both criteria. This alert will only extract the first five permissions and URIs of a message. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | ECR Container Scanning Findings Critical |
---|
| Scanning from an ECR container detected at least one critical risk finding.
This alert filters cloudtrail DescribeImageScanFindings events that come from the ECR service then filter events that have the string CRITICAL within the response parametersSecOpsAWSIAMPolicyAppliedToRole |
|
It was detected that a policy has been attached to a role, these kind of events should be checked since they could be granting excessive access permissions to AWS services or resources. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsEcrImageUpload |
---|
| Detects users uploading new images to AWS Elastic Container Registry (ECR)SecOpsAWSUserSuccessfulLoginWithoutMFA |
|
An AWS console successfully without MFA login was detected. AWS security best practices are recommended to enable this security measure for console access login. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsS3EncryptWithKMSKey |
---|
| Detects actions taken by users to encrypt S3 buckets using KMS keysSecOpsAwsDbSnapshotCreated |
|
Creating a snapshot is a common technique utilized by malicious actors to download databases in a stealthy manner. This alert should be considered when other signals could indicate that an account has been compromised. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSDetectNewUserAWSConsoleLogin |
---|
| This alert triggers when a user logs into the console for the first time in a yearSecOpsAWSLoggingConfigurationChangeObservedStopLogging |
|
A trail within the Cloudtrail service has been stopped. This event should be checked since it could indicate that an attacker may be trying to hide suspicious activity within an AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSUserSuccessfulLoginWithoutMFASecOpsAWSIAMDeletePolicy |
---|
|
An AWS console successfully without MFA login was detected. AWS security best practices are recommended to enable this security measure for console access loginaction to delete a policy was performed. This should be checked since it could undermine the security configuration of the AWS environment. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSCreateAccessKey |
---|
| This search looks for AWS CloudTrail events where a user, who already has permission to create access keys, makes an API call to create access keys for a second userSecOpsAWSIAMCreateUserActionObserved |
|
A new user was created. This actions should be checked since an attacker could have created this user to gain persistence on the AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
| A successful root account login was detected. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.
This detection filters by cloudtrail events with ConsoleLogin as eventName and userName equal to root.SecOpsAWSNetworkAccessControlListDeleted |
|
Network ACl was deleted, this could indicate that an attacker is downgrading security access of a network instance Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSCreateloginprofile |
---|
| Detects if a login has been performed by a user which has been created in the last 24 hours and checks if the user creation and the login has been performed from the same IP. This behaviour could indicate a privilege escalation attempt.
This alert filters ConsoleLogin SecOpsAWSPermissionsBoundaryLiftedtoRole |
|
It was detected that a permission boundary has been lifted against an IAM role. This action could be used by an attacker to escalate privileges within an AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSSetdefaultpolicyversion |
---|
|
This alert filters SetDefaultPolicyVersion cloudtrail events that come from the signing IAM service. The uses a subquery in order to check login profile creations during the 24 hours prior to the login using the IP in order to correlate eventsIn addition, the errorCode has to be equal to null to avoid false positives. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSDetectNewOpenS3BucketsOverAWSCli |
---|
| A request to set a new ACL to a bucket to make it public via CLI has been detected. Although this could be a legitimate action, it should be reviewed.
This alert filters PutBucketAcl cloudtrail events that come from the S3 service. In addition it filters messages without errorMessage to avoid false positives and that the user agent contains aws-cli to filter only command line interface eventsSecOpsAwsUnapprovedUserApiActivity |
|
Detects AWS API activity by users who are not explicitly authorized from an allow list. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsStsPossibleSessionTokenAbuse |
---|
|
Detects STS session tokens, which can be used to move laterally, or escalate, privileges in AWS. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSIamFailureGroupDeletion |
---|
| Deletion of an IAM group is not a dangerous action by itself, but correlated with other events such as recently user or group creations could indicate a malicious behaviour.
This alert filters DeleteGroup cloudtrail events that come from the IAM service. In addition, the errorCode has to be one of the following NoSuchEntityException, DeleteConflictException, AccessDenied |
Detects the scheduled deletion of KMS keys. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSLoggingConfigurationChangeObservedRemoveTags |
---|
| This detection filters by cloudtrail events with RemoveTags as eventName.
Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account |
Detects rare ListQueues event from AWS SQS. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSPermissionsBoundaryModifiedToRole |
---|
|
A Permission Boundary has been modified on a role. This could allow to grant all the actions in the permissions of the policies attached to that role.This alert filters cloudtrail PutRolePermissionsBoundary eventsof the policies attached to that role. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsLog4ShellVulnerabilityCloudAWS |
---|
|
This alert checks for the CVE-2021-44228 exploit (Log4shell). The query looks for payload patterns associated with Log4shell including payloads in the url, user-agent header, referer header, or POST and PUT HTTP bodies. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSPermissionsBoundaryModifiedToUser |
---|
| A Permission Boundary has been modified for a role. This could allow granting all the actions in the permissions of the policies attached to that role.
This alert filters cloudtrail PutRolePermissionsBoundary events with null error messages to avoid false positives | SecOpsAwsKmsSensitiveActivity |
---|
|
Analytics detection about KMS key enable or disable actions. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsLog4ShellVulnerabilityCloudAWS |
---|
| This alert checks for the CVE-2021-44228 exploit (Log4shell). The query looks for payload patterns associated with Log4shell including payloads in the url, user-agent header, referer header, or POST and PUT HTTP bodies.
Alert that checks attempts to exploit CVE-2021-44228 known as Log4shell. The query looks for payload patterns associated with this vulnerability on the log raw message. This would include payloads included in the url, user-agent header, referrer header, or POST and PUT HTTP bodiesSecOpsAwsECRContainerScanningFindingsCritical |
|
Scanning from an ECR container detected at least one critical risk finding. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSOpenNetworkACLs |
---|
|
The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAWSLoggingConfigurationChangeObservedRemoveTags |
---|
|
This detection filters by cloudtrail events with RemoveTags as eventName. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsEc2KeyActionSecOpsAwsS3EncryptWithKMSKey |
---|
|
Detects any actions observed that create, import, or delete access keys to EC2actions taken by users to encrypt S3 buckets using KMS keys. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsKmsKeyDeletion |
---|
| Detects the scheduled deletion of KMS keys | SecOpsAWSExcessiveSecurityScanning |
---|
|
A large number of actions performed which start with Describe have been performed by a single user. This could indicate this user is trying to enumerate the AWS account. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsUnapprovedUserApiActivity |
---|
| Detects AWS API activity by users who are not explicitly authorized from an allow list.
Detection of unapproved users interacting with the AWS API can prevent, abuse, fraud, and other malicious operations from being executedSecOpsAwsMasterKeyDisabledOrDeletion |
|
Detects when a Customer Master Key (CMK) was disabled or scheduled for deletion. Source table → cloud.aws.cloudtrail |
Expand |
---|
title | SecOpsAwsUpdateSAMLProvider |
---|
| Detects actions that update SAML the provider configurationSecOpsAWSCreatePolicyVersionToAllowAllResources |
|
This search looks for AWS CloudTrail events where a user has created a policy version that allows the user to access any resource in their account. Source table → cloud.aws.cloudtrail |
AWS CloudWatch alerts
Expand |
---|
title | AWS CloudWatch - AWS Detect STS Get Session Token Abuse |
---|
| This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS | SecOpsAWSNewUserPoolClientCreated |
---|
|
It was detected that a UserPoolClient entity has been created. These type of entities could be used by an attacker to perform unauthenticated API operations. Source table → cloud.aws.cloudtrail cloudtrail |
Expand |
---|
title | AWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS |
---|
| This alert detects actions that send large amounts of data from AWS out to the internet |
Detects users uploading new images to AWS Elastic Container Registry (ECR). Source table → cloud.aws.cloudtrail cloudtrail |
Amazon VPC
Expand |
---|
title | Amazon VPC - Network Scan |
---|
| Detects scanning of AWS infra via VPC logsSecOpsAWSIamSuccessfulGroupDeletion |
|
Deletion of an IAM group is not a dangerous action by itself, but correlated with other events such as recently user or group creations could indicate that a malicious behaviour. Source table → vpccloud.aws.flowcloudtrail |
Expand |
---|
title | Amazon VPC - Port Scan |
---|
| Detects port scans on AWS infra from VPC logsSecOpsAwsPermanentKeyCreation |
|
Detects actions observed that create, import and delete access keys to EC2. Source table → vpccloud.aws.flow cloudtrail |
Expand |
---|
title | Amazon VPC - Large File Upload |
---|
|
Detects possible large files being moved via AWS VPC logs |
---|
title | SecOpsAwsGetSecretFromNonAmazonIp |
---|
|
Detects a GetSecretValue action where the source IP does not belong in an Amazon instance IP space. Source table → vpccloud.aws.flow cloudtrail |
Expand |
---|
title | SecOpsAwsVpcLargeOutboundTrafficBlock |
---|
| Actions observed as blocked for sending large amounts of data from AWS out to the internetSecOpsAWSECRContainerScanningFindingsLowInformationalUnknown |
|
Scanning from an ECR container detected at least one LOW or UNDEFINED risk finding. Source table → vpccloud.aws.flow cloudtrail |