
Summary
This analytic rule detects potentially unauthorized password resets for Amazon RDS DB instances by monitoring AWS CloudTrail logs for events where the `ModifyDBInstance` API call is made with a new `masterUserPassword` parameter. Password resets can be a vector for attackers to gain access to sensitive information stored in databases, including personal identifiable information (PII), credit card details, and healthcare data. The detection focuses on identifying any such modifications to the `masterUserPassword` and urges immediate investigation to confirm whether the reset was authorized or part of a malicious activity. If confirmed as unauthorized, such incidents could lead to serious data breaches and regulatory issues.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Application Log
- Network Traffic
ATT&CK Techniques
- T1586
- T1586.003
- T1110
- T1110.002
Created: 2024-11-14