heroui logo

AWS GuardDuty High Severity Finding

Panther Rules

View Source
Summary
This detection rule evaluates high-severity findings from AWS GuardDuty, which is a threat detection service that continuously monitors for malicious activity and unauthorized behavior. The rule triggers alerts for findings classified with high severity, specifically those labeled as 'PrivilegeEscalation:IAMUser/AdministrativePermissions'. The detection process involves analyzing the logs generated by GuardDuty and identifying cases where an IAM user or assumed role attempts to escalate privileges inappropriately. The analysis is supported by relevant metadata from the alerts, which includes the severity level, finding type, associated resource ARNs, and AWS account IDs. The dedicated runbook provides critical steps for incident response, including searching related logs to understand the root cause of detected activities. The high severity alerts are indicative of potential security risks and require prompt investigation to mitigate any unauthorized access. Moreover, the predefined deduplication period of 60 minutes is set to reduce the noise from repeated alerts during this time window, thus helping security analysts prioritize their investigations efficiently.
Categories
  • AWS
  • Cloud
  • Identity Management
Data Sources
  • Cloud Service
  • Network Traffic
  • Application Log
Created: 2022-09-02