
Summary
The 'AWS Configuration Recorder Stopped' rule detects when a designated AWS configuration recorder is stopped, potentially hindering visibility into resource configuration changes. This rule monitors AWS CloudTrail events for 'StopConfigurationRecorder' actions, marking this as a high risk due to its implications for security and compliance visibility. The detection aids in identifying unauthorized changes that could signal defense evasion by malicious actors. The rule's guiding principles underscore the importance of thorough investigation, analyzing IAM roles, permissions, and CloudTrail logs, and implementing remediation steps effectively to restore visibility and control. The rule also accounts for potential false positives, advocating for the creation of exceptions where routine actions may trigger alerts. In cases of legitimate stoppage, rapid re-enabling of the configuration recorder is vital to maintain compliance and monitoring frameworks.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.001
Created: 2020-06-16