heroui logo

Detect AWS Console Login by User from New Region

Splunk Security Content

View Source
Summary
This detection rule is designed to identify unauthorized AWS console login attempts from new geographical regions that have not been previously accessed by a user. By leveraging AWS CloudTrail events, the rule maintains a record of each user's login history, comparing recent login attempts against a baseline of known regions in which that user has previously logged in. If a user's latest login is from an unfamiliar region, it may signify a potential security breach, such as credential compromise. The detection utilizes the Splunk platform for analytics, specifically engaging the `Authentication` data model to collate login records and perform IP geolocation to determine the region of each login attempt. It generates alerts to investigate further if a user logs in from a new region within a timeframe indicating a suspicious pattern of access, allowing organizations to safeguard against unauthorized access and potential data breaches.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • User Account
  • Network Traffic
ATT&CK Techniques
  • T1586
  • T1586.003
  • T1535
Created: 2024-11-14