
Summary
The rule 'Spike in AWS Error Messages' is designed to detect significant spikes in error messages logged by AWS CloudTrail, which may indicate attempts at privilege escalation, lateral movement, or reconnaissance activities within an AWS environment. Leveraging machine learning, the rule operates by analyzing a 60-minute interval of CloudTrail logs to identify anomalies in error message rates, setting an anomaly threshold of 50 for alerts.
The rulemaker is Elastic, and the installation requires enabling corresponding machine learning jobs for anomaly detection. The integration must be established with AWS through Elastic Agent, following specified steps to ensure the correct setup of both the agent and logging capabilities.
In terms of risk analysis, incidents detected by this rule should prompt investigation steps such as reviewing specific error histories, correlating with other recent alerts, validating against scheduled updates, and considering contextual factors like user behavior at the time of the alerts. The potential for false positives exists, particularly due to changes in cloud automation or the introduction of new services
The findings can inform on suspicious activities, leading to a refined incident response process that may involve account restriction, credential reviews, and enforcement of best practices. This proactive identification of unusual error messages can help organizations safeguard against potential security incidents in their AWS environments.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Cloud Service
- Network Traffic
Created: 2020-07-13