Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 17 Next »

Overview

Amazon Web Services (AWS) is one of the largest cloud providers out there and as such requires organizations to protect themselves with cloud security monitoring.

SciSec’s content contains dozens of AWS detections so your organization can monitor your AWS infrastructure, look for areas of risk, or help respond to threats as they emerge. The detections are for AWS products and services Cloudtrail, Cloudwatch, and VPC.

Check the different AWS-related detections we provide in the table below, grouped by categories:

AWS CloudTrail alerts

 AWS CloudTrail - IAM User Generating AccessDenied Errors Across Multiple Actions

This alert detects users that received the errorCode value AccessDenied when trying to perform different actions within a short period of time. This could indicate that a user is trying to enumerate their permissions in their AWS account.

This alert filters by events where the errorCode AccessDenied is present and groups every 5 minutes by user arn and aws account.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - AWS Console Login Without MFA

A successful AWS console login without MFA was detected. AWS security best practices recommend enabling this security measure for console access login.

This alert filters CloudTrail events from signin.amazonaws.com with ConsoleLogin as eventName, a success response, and the MFA value not enabled.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - New UserPoolClient Created

This alert detects when a UserPoolClient entity is created. These types of entities could be used by an attacker to perform unauthenticated API operations.

This alert filters CloudTrail events from cognito-idp.amazonaws.com with CreateUserPoolClient as eventName.

Source table → cloud.aws.cloudtrail 

  AWS CloudTrail - Customer Master Key Disabled or Scheduled for Deletion

Detects when a Customer Master Key (CMK) is disabled or scheduled for deletion.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - Database Snapshot Created

Creating DB snapshots is an efficient way for an attacker to begin downloading a target database. These signals should be considered around the context of other signals that may indicate data theft is in progress.

Source table → cloud.aws.cloudtrail 

  AWS CloudTrail - EC2 Access Key Action Detected

This alert detects actions that create, import, and delete access keys to EC2.

Source table → cloud.aws.cloudtrail 

  AWS CloudTrail - GetSecretValue from non-Amazon IP

This alert detects action GetSecretValue for source IPs that do not belong to an Amazon instance IP space.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - Logging Configuration Change Observed (DeleteTrail)

This alert is triggered when a trail within the CloudTrail service is deleted. This event should be checked since it could indicate that an attacker is trying to hide suspicious activity within an AWS account.

This alert filters CloudTrail events with DeleteTrail as eventName.

Source table → cloud.office365.siem_agent_alert

 AWS CloudTrail - Logging Configuration Change Observed (StopLogging)

A trail within the CloudTrail service has been stopped. This event should be checked since it could indicate that an attacker may be trying to hide suspicious activity within an AWS account.

This alert filters CloudTrail events with StopLogging as eventName.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - Multiple Failed Console Logins From a Source IP

This alert is triggered when multiple failed login attempts from the same user are detected. This could indicate that an attacker is trying to brute-force access to that specific user account.

This alert filters CloudTrail events with ConsoleLogin as eventName, errorMessage equal to Failed authentication, and an unsuccessful response. Then, groups by eventName, requestParameters, userIdentity_arn, and userIdentity_accountId and triggers the alert when the count is bigger than 5.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - OpsWorks Describe Permissions Event

The DescribePermissions event retrieves the descriptions of permissions for a specified stack. This could be used by an attacker to collect information for further attacks.

This alert filters CloudTrail events from opsworks.amazonaws.com source with DescribePermissions as eventName.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - Permissions Boundary Lifted (Role)

This alert is triggered when a permission boundary is lifted against an IAM role. This action could be used by an attacker to escalate privileges within an AWS account.

This alert filters by CloudTrail events from iam.amazonaws.com with DeleteRolePermissionsBoundary as eventName.

Source table → cloud.aws.cloudtrail 

 AWS CloudTrail - Permissions Boundary Lifted (User)

This alert is triggered when a permission boundary is lifted against an IAM user. This action could be used by an attacker to escalate privileges within an AWS account.

This alert filters by CloudTrail events from iam.amazonaws.com with DeleteUserPermissionsBoundary as eventName.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - Reconnaissance Related Event

Analytical detection of reconnaissance type behavior from AWS CloudTrail logs.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - SQS List Queues Event

This alert detects rare ListQueues events from AWS SQS.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Schedule Key Deletion in KMS

Detects scheduled deletion of KMS keys.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Network Access Control List Deleted

Network ACL was deleted, this could indicate that an attacker is downgrading security access of a network instance.

This detection filters CloudTrail events with DeleteNetworkAclEntry as eventName.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - Secrets Manager Sensitive Admin Action Observed

Scanning from an ECR container detected at least one high-risk finding.

This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH within the response parameters.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Sensitive Activity in KMS

Analytics detection about KMS key enable/disable actions.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS Detect Role Creation

Detects actions taken to create new IAM roles in AWS.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS Detect STS Assume Role Abuse

Suspicious use of AssumedRole. This type of token could be used by an attacker in order to perform privilege escalation or lateral movements.

This alert filters CloudTrail events with AssumedRole parameter equal to AssumedRole and userIdentity_sessionContext equal to Role.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS Detect Permanent Key Creation

Detects actions observed that create, import, and delete access keys to EC2.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS Detect Users with KMS Keys Performing Encryption S3

Detects actions taken by users to encrypt S3 buckets using KMS keys.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS Network Access Control List Created with All Open Ports

The search looks for CloudTrail events to detect if any network ACLs were created with all the ports open to a specified CIDR.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS SAML Access by Provider User and Principal

This search provides specific information to detect abnormal access or potential credential hijack or forgery, especially in federated environments using SAML protocol inside the perimeter or cloud provider.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS ECR Container Scanning Findings High

This alert triggers when at least one high risk is detected after scanning an ECR container.

This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string HIGH in the response parameters.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS ECR Container Scanning Findings Low Informational Unknown

Scanning from an ECR container detected at least one LOW or UNDEFINED risk finding.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS ECR Container Scanning Findings Medium

This alert triggers when at least one medium risk is detected after scanning an ECR container.

This alert filters CoudTrail DescribeImageScanFindings events that come from the ECR service, then filters events that have the string MEDIUM in the response parameters.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS ECR Container Upload Outside Business Hours

This alert is triggered when a new ECR container is uploaded outside normal business hours (weekend or between 20:00-8:00)

This alert filters CloudTrail PutImage events that come from the ECR service, then filters events using the eventdate parameter, triggering the alert when this value is between 20:00 and 08:00 hours or during weekends.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS ECR Container Upload Unknown User

This alert is triggered when a new ECR container is uploaded by an unknown user. It is possible to include a list of users to not monitor in the SecOpsGWL lookup, using the ARN as a key.

This alert filters PutImage CloudTrail events that come from an ECR service. The alert triggers when the user performing the action is not registered in the SecOpsGWL lookup. Users must be registered in the lookup using the ARN as a key.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS IAM Assume Role Policy Brute Force

Detection of events with errorCode value MalformedPolicyDocumentException. This alert could indicate that someone is trying to identify a role name.

This alert filters CloudTrail events that come from the IAM service and have errorCode equal to MalformedPolicyDocumentException, then groups by common parameters and counts. The alert will trigger when the count is more than 1.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - IAM Policy Applied to a Group

This alert lets you know that policy has been attached to a group. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources.

This detection filters by CloudTrail events with PutGroupPolicy as eventName.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - IAM Policy Applied to Role

This alert lets you know that a policy has been attached to a role. These kinds of events should be checked since they could be granting excessive access permissions to AWS services or resources.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - IAM Policy Applied to User

This alert lets you know that a UserPoolClient entity has been created. These types of entities could be used by an attacker to perform unauthenticated API operations.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - AWS IAM DeletePolicy

This alert lets you know that an action to delete a policy was performed. This should be checked since it could undermine the security configuration of the AWS environment.

This alert filters DeletePolicy CloudTrail events that come from the IAM service and has request parameters attached to them.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS IAM Successful Group Deletion

Deleting an IAM group is not a dangerous action by itself, but correlated with other events such as recent user or group creations could indicate malicious behaviors.

This alert filters DeleteGroup CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives and must have request parameters attached.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS SetDefaultPolicyVersion

This alert detects AWS CloudTrail events where a user has set a default policy version. Attackers have been known to use this technique for Privilege Escalation in case the previous versions of the policy had permission to access more resources than the current version of the policy.

This alert filters SetDefaultPolicyVersion CloudTrail events that come from the IAM service. In addition, the errorCode has to be null to avoid false positives.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - AWS UpdateLoginProfile

This alert detects when a user updates the login profile of a different user. This could indicate that a privilege escalation is being performed leveraging the user whose login profile has been updated.

This alert filters UpdateLoginProfile CloudTrail events that come from the IAM service. Two additional filters are applied: userAgent has to be equal to console.amazonaws.com in order to filter only actions performed through the console, and errorCode must be null to avoid false positives. Then, it groups and extracts the userName of the login profile being updated and triggers the alert if the user performing the action is not the same as the one extracted from the request parameters.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - New Container Uploaded To AWS ECR

This alert detects users uploading new images to AWS Elastic Container Registry (ECR).

Source table → cloud.aws.cloudtrail

  AWS CloudWatch - AWS Detect STS Get Session Token Abuse

This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS.

Source table → cloud.aws.cloudtrail

 AWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS

This alert detects actions that send large amounts of data from AWS out to the internet.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Root Console Successful Login Observed

This alert detects successful root account logins. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.

This detection filters CloudTrail events with ConsoleLogin as eventName and userName equal to root.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - IAM CreateUser Action Observed

This alert detects when a new user is created. This should be checked since an attacker could have created this user to gain persistence on the AWS account.

This alert detects new logs whose eventName is CreateUser and its requestParameters are not null. This indicates that a new user was created in the corresponding AWS account.

Source table → cloud.aws.cloudtrail

  AWS CloudTrail - Multiple Failed Console Logins

Multiple failed login attempts from the same user were detected. This could indicate an attacker could be trying to access that specific user account by brute force.

This detection filters by CloudTrail events with ConsoleLogin as eventName, errorMessage equal to failed authentication and a non-success response. It then groups by eventName, requestParameters, userIdentity_arn and userIdentity_accountId and triggers the alert when the count is greater than five.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Public S3 Bucket Exposed

A request to set a new ACL to a bucket and to make it public has been detected. Although this could be a legitimate action, It should be reviewed.

This alert filters PutBucketAcl CloudTrail events that come from the S3 service. It then extracts each pair of URI and Permission from the raw event message and checks if the URI is equal to http://acs.amazonaws.com/groups/global/AllUsers or http://acs.amazonaws.com/groups/global/AuthenticatedUsers and the permission is READ, READ_ACP, WRITE, WRITE_ACP or FULL_CONTROL. The alert will trigger if any of the pairs checked meet both requirements. This alert will only extract the first five permissions and URIs of a message.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Logging Configuration Change Observed Remove Tags

This detection filters by CloudTrail events with RemoveTags as eventName.

Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Create Policy Version To Allow All Resources

This search looks for AWS CloudTrail events where a user created a policy version that allows them to access any resource in their account.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Create Access Key

This search looks for AWS CloudTrail events where a user who already has permission to create access keys, makes an API call to create access keys for another user.

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Excessive Security Scanning

A large number of actions performed which start with Describe have been performed by a single user. This could indicate this user is trying to enumerate the AWS account.

This alert filters CloudTrail events in which eventName starts with one of the following strings: Describe, Get or List. It groups by IP address, account and source name. Then it collects a list of the diferent event names included in each entry and triggers the alert if the list is greater than 50. 

Source table → cloud.aws.cloudtrail

 AWS CloudTrail - Detect Users Creating Keys With Encrypt Policy Without MFA

Creation of a KMS key with action kms:Encrypt is available for everyone. This could be a compromised account indicator.

This alert filters CreateKey and PutKeyPolicy CloudTrail events that come from the KMS service. It then parses the diferent principals and actions from the requestParameters (the alert will consider only the first five principals and actions, the following will be disregarded). The alert triggers when one of the pairs meets the following criteria:

  • The action contains the string kms:* or kms:Encrypt

  • The principal contains the string AWS:*

Source table → cloud.aws.cloudtrail

 ECR Container Scanning Findings Critical

Scanning from an ECR container detected at least one critical risk finding.

This alert filters cloudtrail DescribeImageScanFindings events that come from the ECR service then filter events that have the string CRITICAL within the response parameters.

Source table → cloud.aws.cloudtrail

 SecOpsAwsEcrImageUpload

Detects users uploading new images to AWS Elastic Container Registry (ECR).

Source table → cloud.aws.cloudtrail

 SecOpsAwsS3EncryptWithKMSKey

Detects actions taken by users to encrypt S3 buckets using KMS keys.

Source table → cloud.aws.cloudtrail

 SecOpsAWSDetectNewUserAWSConsoleLogin

This alert triggers when a user logs into the console for the first time in a year.

Source table → cloud.aws.cloudtrail

 SecOpsAWSUserSuccessfulLoginWithoutMFA

An AWS console successfully without MFA login was detected. AWS security best practices are recommended to enable this security measure for console access login.

Source table → cloud.aws.cloudtrail

 SecOpsAWSCreateAccessKey

This search looks for AWS CloudTrail events where a user, who already has permission to create access keys, makes an API call to create access keys for a second user.

Source table → cloud.aws.cloudtrail

 SecOpsAWSRootLogin

A successful root account login was detected. This account should only be used to create initial IAM users or perform tasks only available to the root user. Using this account is against AWS security best practices.

This detection filters by cloudtrail events with ConsoleLogin as eventName and userName equal to root.

Source table → cloud.aws.cloudtrail

 SecOpsAWSCreateloginprofile

Detects if a login has been performed by a user which has been created in the last 24 hours and checks if the user creation and the login has been performed from the same IP. This behaviour could indicate a privilege escalation attempt.

This alert filters ConsoleLogin cloudtrail events that come from the signing service. The uses a subquery in order to check login profile creations during the 24 hours prior to the login using the IP in order to correlate events.

Source table → cloud.aws.cloudtrail

 SecOpsAWSDetectNewOpenS3BucketsOverAWSCli

A request to set a new ACL to a bucket to make it public via CLI has been detected. Although this could be a legitimate action, it should be reviewed.

This alert filters PutBucketAcl cloudtrail events that come from the S3 service. In addition it filters messages without errorMessage to avoid false positives and that the user agent contains aws-cli to filter only command line interface events.

Source table → cloud.aws.cloudtrail

 SecOpsAWSIamFailureGroupDeletion

Deletion of an IAM group is not a dangerous action by itself, but correlated with other events such as recently user or group creations could indicate a malicious behaviour.

This alert filters DeleteGroup cloudtrail events that come from the IAM service. In addition, the errorCode has to be one of the following NoSuchEntityException, DeleteConflictException, AccessDenied.

Source table → cloud.aws.cloudtrail

 SecOpsAWSLoggingConfigurationChangeObservedRemoveTags

This detection filters by cloudtrail events with RemoveTags as eventName.

Some tags were removed from the configuration of a logging trail. This event should be checked since it could indicate an attacker may be trying to hide suspicious activity within an AWS account.

Source table → cloud.aws.cloudtrail

 SecOpsAWSPermissionsBoundaryModifiedToRole

A Permission Boundary has been modified on a role. This could allow to grant all the actions in the permissions of the policies attached to that role.

This alert filters cloudtrail PutRolePermissionsBoundary events.

Source table → cloud.aws.cloudtrail

 SecOpsAWSPermissionsBoundaryModifiedToUser

A Permission Boundary has been modified for a role. This could allow granting all the actions in the permissions of the policies attached to that role.

This alert filters cloudtrail PutRolePermissionsBoundary events with null error messages to avoid false positives.

Source table → cloud.aws.cloudtrail

 SecOpsLog4ShellVulnerabilityCloudAWS

This alert checks for the CVE-2021-44228 exploit (Log4shell). The query looks for payload patterns associated with Log4shell including payloads in the url, user-agent header, referer header, or POST and PUT HTTP bodies.

Alert that checks attempts to exploit CVE-2021-44228 known as Log4shell. The query looks for payload patterns associated with this vulnerability on the log raw message. This would include payloads included in the url, user-agent header, referrer header, or POST and PUT HTTP bodies.

Source table → cloud.aws.cloudtrail

 SecOpsAwsEc2KeyAction

Detects any actions observed that create, import, or delete access keys to EC2.

Source table → cloud.aws.cloudtrail

 SecOpsAwsKmsKeyDeletion

Detects the scheduled deletion of KMS keys.

Source table → cloud.aws.cloudtrail

AWS CloudWatch alerts

 AWS CloudWatch - AWS Detect STS Get Session Token Abuse

This alert detects actions to get STS session tokens, which can be used to move laterally or escalate privileges in AWS.

Source table → cloud.aws.cloudtrail 

 AWS CloudWatch - Detect Spike In Blocked Outbound Traffic From Your AWS

This alert detects actions that send large amounts of data from AWS out to the internet.

Source table → cloud.aws.cloudtrail 

Amazon VPC

 Amazon VPC - Network Scan

Detects scanning of AWS infra via VPC logs.

Source table → vpc.aws.flow

 Amazon VPC - Port Scan

Detects port scans on AWS infra from VPC logs.

Source table → vpc.aws.flow 

 Amazon VPC - Large File Upload

Detects possible large files being moved via AWS VPC logs.

Source table → vpc.aws.flow 

 SecOpsAwsVpcLargeOutboundTrafficBlock

Actions observed as blocked for sending large amounts of data from AWS out to the internet.

Source table → vpc.aws.flow 

  • No labels