Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

Amazon Web Services (AWS) is one of the largest cloud providers out there and as such requires organizations to protect themselves with cloud security monitoring.

SciSec’s content contains dozens of AWS detections so your organization can monitor your AWS infrastructure, look for areas of risk, or help respond to threats as they emerge. The detections are for AWS products and services Cloudtrail, Cloudwatch, and VPC.

Check the different AWS-related detections we provide in the table below, grouped by categories:

Table of Contents
maxLevel3
minLevel3

...

This alert detects users that received the errorCode value AccessDenied when trying to perform different actions within a short period of time. This could indicate that a user is trying to enumerate their permissions in their AWS account.

This alert filters by events where the errorCode AccessDenied is present and groups every 5 minutes by user arn and aws account.
Expand
titleAWS CloudTrail - IAM User Generating AccessDenied Errors Across Multiple Actions
SecOpsAWSOpsWorksDescribePermissionsEvent

The DescribePermissions event retrieves a description about permissions for a specified stack. This could be used by an attacker to collect information for further attacks.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAwsUpdateSAMLProvider

Detects actions that update SAML the provider configuration

Source table → cloud.aws.cloudtrail cloudtrail

A successful AWS console login without MFA was detected. AWS security best practices recommend enabling this security measure for console access login.

This alert filters CloudTrail events from signin.amazonaws.com with ConsoleLogin as eventName, a success response, and the MFA value not enabled.
Expand
titleAWS CloudTrail - AWS Console Login Without MFA
SecOpsAWSSamlAccess

This search provides specific information to detect abnormal access or potential credential hijack or forgery, specially in federated environments using SAML protocol inside the perimeter or cloud provider

Source table → cloud.aws.cloudtrail cloudtrail

This alert detects when a UserPoolClient entity is created. These types of entities
Expand
titleAWS CloudTrail - New UserPoolClient Created
SecOpsAWSPermissionsBoundaryLiftedtoUser

It was detected that a permission boundary has been lifted against an IAM user. This action could be used by an attacker to perform unauthenticated API operations.This alert filters CloudTrail events from cognito-idp.amazonaws.com with CreateUserPoolClient as eventNameescalate privileges within an AWS account.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAWSMultipleFailedConsoleLoginsFromASourceIP

The Describe permissions event retrieves a description of permissions for a specified stack. This could be used by an attacker to collect information for further attacks.

Source table → cloud.aws.cloudtrail cloudtrail

Detects when a Customer Master Key (CMK) is disabled or scheduled for deletion
Expand
title AWS CloudTrail - Customer Master Key Disabled or Scheduled for Deletion
SecOpsAWSIAMPolicyAppliedToGroup

It was detected that a policy had been attached to a group. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources.

Source table → cloud.aws.cloudtrail

Creating DB snapshots is an efficient way for an attacker to begin downloading a target database. These signals should be considered around the context of other signals that may indicate data theft is in progress
Expand
title AWS CloudTrail - Database Snapshot Created
SecOpsAWSLoggingConfigurationChangeObservedDeleteTrail

A trail within the Cloudtrail service has been deleted. This event should be checked since it could indicate that an attacker may be trying to hide suspicious activity within an AWS account.

Source table → cloud.aws.cloudtrail cloudtrail

This alert detects actions that create, import, and delete access keys to EC2.
Expand
title AWS CloudTrail - EC2 Access Key Action Detected
SecOpsAwsECRContainerUploadOutsideBusinessHours

Upload of a new ECR container was performed outside normal business hours. This is during weekend or between 20:00 and 8:00

Source table → cloud.aws.cloudtrail cloudtrail

This alert detects action GetSecretValue for source IPs that do not belong to an Amazon instance IP space
Expand
title AWS CloudTrail - GetSecretValue from non-Amazon IP
SecOpsAWSDetectUsersCreatingKeysWithEncryptPolicyWithoutMFA

Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAwsEc2KeyAction

Detects any actions observed that create, import, or delete access keys to EC2.

Source table → cloud.aws.cloudtrail cloudtrail

This alert filters CloudTrail events with DeleteTrail as eventName

This alert is triggered when a trail within the CloudTrail service is deleted. This event should be checked since it could indicate that an attacker is trying to hide suspicious activity within an AWS account.

Expand
titleAWS CloudTrail - Logging Configuration Change Observed (DeleteTrail)
SecOpsCDIocIpSuspiciousAWSData

This search looks for Collective Defense matches in AWS data.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAWSCreateloginprofile

Detects if a login has been performed by a user which has been created in the last 24 hours and checks if the user creation and the login has been performed from the same IP. This behaviour could indicate a privilege escalation attempt.

Source table → cloud.office365.siem_agent_alertaws.cloudtrail

A trail within the CloudTrail service has been stopped. This event
Expand
titleAWS CloudTrail - Logging Configuration Change Observed (StopLogging)
SecOpsAWSIAMPolicyAppliedToUser

It was detected that a policy has been attached to a role, these kind of events should be checked since it they could indicate that an attacker may be trying to hide suspicious activity within an AWS account.This alert filters CloudTrail events with StopLogging as eventNamebe granting excessive access permissions to AWS services or resources.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAwsVpcLargeOutboundTrafficBlock

Actions observed as blocked for sending large amounts of data from AWS out to the internet.

Source table → cloudvpc.aws.cloudtrail flow

- Multiple Failed Console Logins From a Source IP
Expand
titleSecOpsAWSCreateAccessKey

This search looks for AWS CloudTrail

This alert is triggered when multiple events where a user, who already has permission to create access keys, makes an API call to create access keys for a second user.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAWSMultipleFailedConsoleLogins

Multiple failed login attempts from the same user are were detected. This could indicate that an attacker is could be trying to brute - force access to that specific user account.

This alert filters CloudTrail events with ConsoleLogin as eventName, errorMessage equal to Failed authentication, and an unsuccessful response. Then, groups by eventName, requestParameters, userIdentity_arn, and userIdentity_accountId and triggers the alert when the count is bigger than 5.

Source table → cloud.aws.cloudtrail 

Expand
titleAWS CloudTrail - OpsWorks Describe Permissions Event

The DescribePermissions event retrieves the descriptions of permissions for a specified stack. This could be used by an attacker to collect information for further attacks.

This alert filters CloudTrail events from opsworks.amazonaws.com source with DescribePermissions as eventName.

Source table → cloud.aws.cloudtrail 

Expand
titleAWS CloudTrail - Permissions Boundary Lifted (Role)

This alert is triggered when a permission boundary is lifted against an IAM role. This action could be used by an attacker to escalate privileges within an AWS account.

This alert filters by CloudTrail events from iam.amazonaws.com with DeleteRolePermissionsBoundary as eventName.

Source table → cloud.aws.cloudtrail 

Expand
titleAWS CloudTrail - Permissions Boundary Lifted (User)

This alert is triggered when a permission boundary is lifted against an IAM user. This action could be used by an attacker to escalate privileges within an AWS account.

This alert filters by CloudTrail events from iam.amazonaws.com with DeleteUserPermissionsBoundary as eventName.Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAwsVpcLargeFile

Detects possible large file being moved via AWS VPC logs.

Source table → vpc.aws.flow

Expand
titleSecOpsAWSPermissionsBoundaryModifiedToUser

A Permission Boundary has been modified for a role. This could allow granting all the actions in the permissions of the policies attached to that role.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAWSUpdateloginprofile

A user has updated the login profile of a different user. This could indicate that a privilege escalation is being performed leveraging the user which login profile has been updated.

Source table → cloud.aws.cloudtrail

Analytical detection of reconnaissance type behavior from AWS CloudTrail logs
Expand
title AWS CloudTrail - Reconnaissance Related Event
SecOpsAWSDetectStsAssumeRoleAbuse

Suspicious use of "AssumedRole". This type of tokens could be used by an attacker in order perform privilege escalation or lateral movements.

Source table → cloud.aws.cloudtrail

This alert detects rare ListQueues events from AWS SQS
Expand
title AWS CloudTrail - SQS List Queues Event
SecOpsAWSIAMAssumeRolePolicyBruteForce

Detection of events with errorCode "MalformedPolicyDocumentException". A malformed policy document exception occurs in instances where roles are attempted to be assumed, or brute forced.

Source table → cloud.aws.cloudtrail

Detects scheduled deletion of KMS keys.
Expand
titleAWS CloudTrail - Schedule Key Deletion in KMS
SecOpsAwsRoleCreated

Detects actions taken to create new IAM roles in AWS

Source table → cloud.aws.cloudtrail

Network ACL was deleted, this could indicate that an attacker is downgrading security access of a network instance.

This detection filters CloudTrail events with DeleteNetworkAclEntry as eventName
Expand
titleAWS CloudTrail - Network Access Control List Deleted
SecOpsAWSIAMUserGeneratingAccessDeniedErrorsAcrossMultipleActions

This alert checks filters by events where the errorCode AccessDenied is present and groups each 5 minutes by user arn and aws account.

Source table → cloud.aws.cloudtrail

Scanning from an ECR container detected at least one high-risk finding.

This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH within the response parameters
Expand
title AWS CloudTrail - Secrets Manager Sensitive Admin Action Observed
SecOpsAWSRootLogin

A successful root account login was detected. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.

Source table → cloud.aws.cloudtrail

Expand
titleSecOpsAWSSecretsManagerSensitiveAdminActionObservedAWS CloudTrail - Sensitive Activity in KMS

Analytics detection about KMS key enable/disable actionsAny modification action performed against the AWS Secrets Administrative service should be reviewd. This could be an indicator of suspicious activity being carried out by a hostile entity.

Source table → cloud.aws.cloudtrail

Detects actions taken to create new IAM roles in AWS
Expand
title AWS CloudTrail - AWS Detect Role Creation
SecOpsAwsCloudTrailReconEvent

Analytical detection of a reconnaissance type behavior from AWS CloudTrail logs.

Source table → cloud.aws.cloudtrail

Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator.

This alert filters CreateKey and PutKeyPolicy CloudTrail events that come from the KMS service. It then parses the diferent principals and actions from the requestParameters (the alert will consider only the first five principals and actions, the following will be disregarded). The alert triggers when one of the pairs meets the following criteria:

  • The action contains the string kms:* or kms:Encrypt

  • The principal contains the string AWS:*
    Expand
    Expand
    titleAWS CloudTrail - Detect Users Creating Keys With Encrypt Policy Without MFA
    titleAWS CloudTrail - AWS Detect STS Assume Role Abuse

    Suspicious use of AssumedRole. This type of token could be used by an attacker in order to perform privilege escalation or lateral movements.

    This alert filters CloudTrail events with AssumedRole parameter equal to AssumedRole and userIdentity_sessionContext equal to Role.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS Detect Permanent Key Creation

    Detects actions observed that create, import, and delete access keys to EC2.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS Detect Users with KMS Keys Performing Encryption S3

    Detects actions taken by users to encrypt S3 buckets using KMS keys.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS Network Access Control List Created with All Open Ports

    The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS SAML Access by Provider User and Principal

    This search provides specific information to detect abnormal access or potential credential hijack or forgery, especially in federated environments using SAML protocol inside the perimeter or cloud provider.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS ECR Container Scanning Findings High

    This alert triggers when at least one high risk is detected after scanning an ECR container.

    This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH in the response parameters.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS ECR Container Scanning Findings Low Informational Unknown

    Scanning from an ECR container detected at least one LOW or UNDEFINED risk finding.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS ECR Container Scanning Findings Medium

    This alert triggers when at least one medium risk is detected after scanning an ECR container.

    This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string MEDIUM in the response parameters.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS ECR Container Upload Outside Business Hours

    This alert is triggered when a new ECR container is uploaded outside normal business hours (weekend or between 20:00-8:00)

    This alert filters CloudTrail PutImage events that come from the ECR service, then filters events using the eventdate parameter, triggering the alert when this value is between 20:00 and 08:00 hours or during weekends.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS ECR Container Upload Unknown User

    This alert is triggered when a new ECR container is uploaded by an unknown user. It is possible to include a list of users to not monitor in the SecOpsGWL lookup, using the ARN as a key.

    This alert filters PutImage CloudTrail events that come from an ECR service. The alert triggers when the user performing the action is not registered in the SecOpsGWL lookup. Users must be registered in the lookup using the ARN as a key.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS IAM Assume Role Policy Brute Force

    Detection of events with errorCode value MalformedPolicyDocumentException. This alert could indicate that someone is trying to identify a role name.

    This alert filters CloudTrail events that come from the IAM service and have errorCode equal to MalformedPolicyDocumentException, then groups by common parameters and counts. The alert will trigger when the count is more than 1.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - IAM Policy Applied to a Group

    This alert lets you know that policy has been attached to a group. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources.

    This detection filters by CloudTrail events with PutGroupPolicy as eventName.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - IAM Policy Applied to Role

    This alert lets you know that a policy has been attached to a role. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - IAM Policy Applied to User

    This alert lets you know that a UserPoolClient entity has been created. These types of entities could be used by an attacker to perform unauthenticated API operations.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - AWS IAM DeletePolicy

    This alert lets you know that an action to delete a policy was performed. This should be checked since it could undermine the security configuration of the AWS environment.

    This alert filters DeletePolicy CloudTrail events that come from the IAM service and has request parameters attached to them.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS IAM Successful Group Deletion

    Deleting an IAM group is not a dangerous action by itself, but correlated with other events such as recent user or group creations could indicate malicious behaviors.

    This alert filters DeleteGroup CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives and must have request parameters attached.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS SetDefaultPolicyVersion

    This alert detects AWS CloudTrail events where a user has set a default policy version. Attackers have been known to use this technique for Privilege Escalation in case the previous versions of the policy had permission to access more resources than the current version of the policy.

    This alert filters SetDefaultPolicyVersion CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - AWS UpdateLoginProfile

    This alert detects when a user updates the login profile of a different user. This could indicate that a privilege escalation is being performed leveraging the user whose login profile has been updated.

    This alert filters UpdateLoginProfile CloudTrail events that come from the IAM service. Two additional filters are applied: userAgent has to be equal to console.amazonaws.com in order to filter only actions performed through the console, and errorCode must be null to avoid false positives. Then, it groups and extracts the userName of the login profile being updated and triggers the alert if the user performing the action is not the same as the one extracted from the request parameters.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - New Container Uploaded To AWS ECR

    This alert detects users uploading new images to AWS Elastic Container Registry (ECR).

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudWatch - AWS Detect STS Get Session Token Abuse

    This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS

    This alert detects actions that send large amounts of data from AWS out to the internet.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Root Console Successful Login Observed

    This alert detects successful root account logins. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.

    This detection filters CloudTrail events with ConsoleLogin as eventName and userName equal to root.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - IAM CreateUser Action Observed

    This alert detects when a new user is created. This should be checked since an attacker could have created this user to gain persistence on the AWS account.

    This alert detects new logs whose eventName is CreateUser and its requestParameters are not null. This indicates that a new user was created in the corresponding AWS account.

    Source table → cloud.aws.cloudtrail

    Expand
    title AWS CloudTrail - Multiple Failed Console Logins

    Multiple failed login attempts from the same user were detected. This could indicate an attacker could be trying to access that specific user account by brute force.

    This detection filters by CloudTrail events with ConsoleLogin as eventName, errorMessage equal to failed authentication and a non-success response. It then groups by eventName, requestParameters, userIdentity_arn and userIdentity_accountId and triggers the alert when the count is greater than five.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Public S3 Bucket Exposed

    A request to set a new ACL to a bucket and to make it public has been detected. Although this could be a legitimate action, It should be reviewed.

    This alert filters PutBucketAcl CloudTrail events that come from the S3 service. It then extracts each pair of URI and Permission from the raw event message and checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and the permission is READ, READ_ACP, WRITE, WRITE_ACP or FULL_CONTROL. The alert will trigger if any of the pairs checked meet both requirements. This alert will only extract the first five permissions and URIs of a message.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Logging Configuration Change Observed Remove Tags

    This detection filters by CloudTrail events with RemoveTags as eventName.

    Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Create Policy Version To Allow All Resources

    This search looks for AWS CloudTrail events where a user created a policy version that allows them to access any resource in their account.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Create Access Key

    This search looks for AWS CloudTrail events where a user who already has permission to create access keys, makes an API call to create access keys for another user.

    Source table → cloud.aws.cloudtrail

    Expand
    titleAWS CloudTrail - Excessive Security Scanning

    A large number of actions performed which start with Describe have been performed by a single user. This could indicate this user is trying to enumerate the AWS account.

    This alert filters CloudTrail events in which eventName starts with one of the following strings: Describe, Get or List. It groups by IP address, account and source name. Then it collects a list of the diferent event names included in each entry and triggers the alert if the list is greater than 50. 

    Source table → cloud.aws.cloudtrail

    SecOpsAWSPublicS3BucketExposed

    This alert filters PutBucketAcl cloudtrail events that come from the S3 service. The alert then extracts each URI and Permission pair from the raw event message. The alert then checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and if the permission is READ, READ_ACP, WRITE, WRITE_ACP, or FULL_CONTROL. The alert will trigger if any of these pairs meet both criteria. This alert will only extract the first five permissions and URIs of a message.

    Source table → cloud.aws.cloudtrail

    Scanning from an ECR container detected at least one critical risk finding.

    This alert filters cloudtrail DescribeImageScanFindings events that come from the ECR service then filter events that have the string CRITICAL within the response parameters
    Expand
    titleECR Container Scanning Findings Critical
    SecOpsAWSIAMPolicyAppliedToRole

    It was detected that a policy has been attached to a role, these kind of events should be checked since they could be granting excessive access permissions to AWS services or resources.

    Source table → cloud.aws.cloudtrail

    Detects users uploading new images to AWS Elastic Container Registry (ECR)
    Expand
    titleSecOpsAwsEcrImageUpload
    SecOpsAWSUserSuccessfulLoginWithoutMFA

    An AWS console successfully without MFA login was detected. AWS security best practices are recommended to enable this security measure for console access login.

    Source table → cloud.aws.cloudtrail

    Detects actions taken by users to encrypt S3 buckets using KMS keys
    Expand
    titleSecOpsAwsS3EncryptWithKMSKey
    SecOpsAwsDbSnapshotCreated

    Creating a snapshot is a common technique utilized by malicious actors to download databases in a stealthy manner. This alert should be considered when other signals could indicate that an account has been compromised.

    Source table → cloud.aws.cloudtrail

    This alert triggers when a user logs into the console for the first time in a year
    Expand
    titleSecOpsAWSDetectNewUserAWSConsoleLogin
    SecOpsAWSLoggingConfigurationChangeObservedStopLogging

    A trail within the Cloudtrail service has been stopped. This event should be checked since it could indicate that an attacker may be trying to hide suspicious activity within an AWS account.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAWSUserSuccessfulLoginWithoutMFASecOpsAWSIAMDeletePolicy

    An AWS console successfully without MFA login was detected. AWS security best practices are recommended to enable this security measure for console access loginaction to delete a policy was performed. This should be checked since it could undermine the security configuration of the AWS environment.

    Source table → cloud.aws.cloudtrail

    This search looks for AWS CloudTrail events where a user, who already has permission to create access keys, makes an API call to create access keys for a second user
    Expand
    titleSecOpsAWSCreateAccessKey
    SecOpsAWSIAMCreateUserActionObserved

    A new user was created. This actions should be checked since an attacker could have created this user to gain persistence on the AWS account.

    Source table → cloud.aws.cloudtrail

    A successful root account login was detected. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.

    This detection filters by cloudtrail events with ConsoleLogin as eventName and userName equal to root.
    Expand
    titleSecOpsAWSRootLogin
    SecOpsAWSNetworkAccessControlListDeleted

    Network ACl was deleted, this could indicate that an attacker is downgrading security access of a network instance

    Source table → cloud.aws.cloudtrail

    Detects if a login has been performed by a user which has been created in the last 24 hours and checks if the user creation and the login has been performed from the same IP. This behaviour could indicate a privilege escalation attempt.

    This alert filters ConsoleLogin
    Expand
    titleSecOpsAWSCreateloginprofile
    SecOpsAWSPermissionsBoundaryLiftedtoRole

    It was detected that a permission boundary has been lifted against an IAM role. This action could be used by an attacker to escalate privileges within an AWS account.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAWSSetdefaultpolicyversion

    This alert filters SetDefaultPolicyVersion cloudtrail events that come from the signing IAM service. The uses a subquery in order to check login profile creations during the 24 hours prior to the login using the IP in order to correlate eventsIn addition, the errorCode has to be equal to null to avoid false positives.

    Source table → cloud.aws.cloudtrail

    A request to set a new ACL to a bucket to make it public via CLI has been detected. Although this could be a legitimate action, it should be reviewed.

    This alert filters PutBucketAcl cloudtrail events that come from the S3 service. In addition it filters messages without errorMessage to avoid false positives and that the user agent contains aws-cli to filter only command line interface events
    Expand
    titleSecOpsAWSDetectNewOpenS3BucketsOverAWSCli
    SecOpsAwsUnapprovedUserApiActivity

    Detects AWS API activity by users who are not explicitly authorized from an allow list.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAwsStsPossibleSessionTokenAbuse

    Detects STS session tokens, which can be used to move laterally, or escalate, privileges in AWS.

    Source table → cloud.aws.cloudtrail

    Deletion of an IAM group is not a dangerous action by itself, but correlated with other events such as recently user or group creations could indicate a malicious behaviour.

    This alert filters DeleteGroup cloudtrail events that come from the IAM service. In addition, the errorCode has to be one of the following NoSuchEntityException, DeleteConflictException, AccessDenied
    Expand
    titleSecOpsAWSIamFailureGroupDeletion
    SecOpsAwsKmsKeyDeletion

    Detects the scheduled deletion of KMS keys.

    Source table → cloud.aws.cloudtrail

    This detection filters by cloudtrail events with RemoveTags as eventName.

    Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account
    Expand
    titleSecOpsAWSLoggingConfigurationChangeObservedRemoveTags
    SecOpsAwsSqsListQueues

    Detects rare ListQueues event from AWS SQS.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAWSPermissionsBoundaryModifiedToRole

    A Permission Boundary has been modified on a role. This could allow to grant all the actions in the permissions of the policies attached to that role.This alert filters cloudtrail PutRolePermissionsBoundary eventsof the policies attached to that role.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsLog4ShellVulnerabilityCloudAWS

    This alert checks for the CVE-2021-44228 exploit (Log4shell). The query looks for payload patterns associated with Log4shell including payloads in the url, user-agent header, referer header, or POST and PUT HTTP bodies.

    Source table → cloud.aws.cloudtrail

    A Permission Boundary has been modified for a role. This could allow granting all the actions in the permissions of the policies attached to that role.

    This alert filters cloudtrail PutRolePermissionsBoundary events with null error messages to avoid false positives
    Expand
    titleSecOpsAWSPermissionsBoundaryModifiedToUser
    SecOpsAwsKmsSensitiveActivity

    Analytics detection about KMS key enable or disable actions.

    Source table → cloud.aws.cloudtrail

    This alert checks for the CVE-2021-44228 exploit (Log4shell). The query looks for payload patterns associated with Log4shell including payloads in the url, user-agent header, referer header, or POST and PUT HTTP bodies.

    Alert that checks attempts to exploit CVE-2021-44228 known as Log4shell. The query looks for payload patterns associated with this vulnerability on the log raw message. This would include payloads included in the url, user-agent header, referrer header, or POST and PUT HTTP bodies
    Expand
    titleSecOpsLog4ShellVulnerabilityCloudAWS
    SecOpsAwsECRContainerScanningFindingsCritical

    Scanning from an ECR container detected at least one critical risk finding.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAWSOpenNetworkACLs

    The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAWSLoggingConfigurationChangeObservedRemoveTags

    This detection filters by cloudtrail events with RemoveTags as eventName.

    Source table → cloud.aws.cloudtrail

    Expand
    titleSecOpsAwsEc2KeyActionSecOpsAwsS3EncryptWithKMSKey

    Detects any actions observed that create, import, or delete access keys to EC2actions taken by users to encrypt S3 buckets using KMS keys.

    Source table → cloud.aws.cloudtrail

    Detects the scheduled deletion of KMS keys
    Expand
    titleSecOpsAwsKmsKeyDeletion
    SecOpsAWSExcessiveSecurityScanning

    A large number of actions performed which start with Describe have been performed by a single user. This could indicate this user is trying to enumerate the AWS account.

    Source table → cloud.aws.cloudtrail

    Detects AWS API activity by users who are not explicitly authorized from an allow list.

    Detection of unapproved users interacting with the AWS API can prevent, abuse, fraud, and other malicious operations from being executed
    Expand
    titleSecOpsAwsUnapprovedUserApiActivity
    SecOpsAwsMasterKeyDisabledOrDeletion

    Detects when a Customer Master Key (CMK) was disabled or scheduled for deletion.

    Source table → cloud.aws.cloudtrail

    Detects actions that update SAML the provider configuration
    Expand
    titleSecOpsAwsUpdateSAMLProvider
    SecOpsAWSCreatePolicyVersionToAllowAllResources

    This search looks for AWS CloudTrail events where a user has created a policy version that allows the user to access any resource in their account.

    Source table → cloud.aws.cloudtrail

    AWS CloudWatch alerts

    This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS
    Expand
    titleAWS CloudWatch - AWS Detect STS Get Session Token Abuse
    SecOpsAWSNewUserPoolClientCreated

    It was detected that a UserPoolClient entity has been created. These type of entities could be used by an attacker to perform unauthenticated API operations.

    Source table → cloud.aws.cloudtrail cloudtrail

    This alert detects actions that send large amounts of data from AWS out to the internet
    Expand
    titleAWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS
    SecOpsAwsEcrImageUpload

    Detects users uploading new images to AWS Elastic Container Registry (ECR).

    Source table → cloud.aws.cloudtrail cloudtrail

    Amazon VPC

    Detects scanning of AWS infra via VPC logs
    Expand
    titleAmazon VPC - Network Scan
    SecOpsAWSIamSuccessfulGroupDeletion

    Deletion of an IAM group is not a dangerous action by itself, but correlated with other events such as recently user or group creations could indicate that a malicious behaviour.

    Source table → vpccloud.aws.flowcloudtrail

    Detects port scans on AWS infra from VPC logs
    Expand
    titleAmazon VPC - Port Scan
    SecOpsAwsPermanentKeyCreation

    Detects actions observed that create, import and delete access keys to EC2.

    Source table → vpccloud.aws.flow cloudtrail

    Detects possible large files being moved via AWS VPC logs
    Expand
    titleAmazon VPC - Large File Upload
    titleSecOpsAwsGetSecretFromNonAmazonIp

    Detects a GetSecretValue action where the source IP does not belong in an Amazon instance IP space.

    Source table → vpccloud.aws.flow cloudtrail

    Actions observed as blocked for sending large amounts of data from AWS out to the internet
    Expand
    titleSecOpsAwsVpcLargeOutboundTrafficBlock
    SecOpsAWSECRContainerScanningFindingsLowInformationalUnknown

    Scanning from an ECR container detected at least one LOW or UNDEFINED risk finding.

    Source table → vpccloud.aws.flow cloudtrail