
Summary
This rule is designed to detect potential security threats within AWS Elastic Container Service (ECS) specifically related to the inclusion of a command that queries the AWS credential endpoint in a task definition. A command executing a query against the '$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI' could be indicative of an adversary attempting to establish persistence or escalate privileges within the environment by executing unauthorized commands through a modified ECS Task Definition. The rule monitors specific AWS CloudTrail events related to task definition modifications and execution to identify such risky configurations. It leverages AWS CloudTrail logs, particularly focusing on events such as 'DescribeTaskDefinition,' 'RegisterTaskDefinition,' and 'RunTask.' If a container definition command contains the string that queries the credential endpoint, it raises a medium-level alert. This rule is critical for maintaining the security posture of environments utilizing ECS by enabling early detection of potential backdoor establishment attempts by malicious actors.
Categories
- Cloud
- AWS
- Containers
Data Sources
- Cloud Service
- Logon Session
Created: 2022-06-07