heroui logo

AWS GuardDuty Important Change

Sigma Rules

View Source
Summary
This detection rule is designed to monitor changes to the AWS GuardDuty trusted IP list, specifically focusing on the creation of new IP sets via the CloudTrail logs. By detecting events where the `eventSource` is `guardduty.amazonaws.com` and the `eventName` is `CreateIPSet`, this rule aims to identify potential misuse of the feature to whitelist malicious IPs. Such changes can compromise the integrity of the security posture by potentially ignoring attacks from those malicious IPs. Therefore, it is crucial for security teams to gain insights into when these critical changes are made, aiding in better response to potential threats.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
Created: 2020-02-11