
Summary
The AWS EC2 Enumeration detection rule is designed to monitor and identify suspicious AWS API calls that are indicative of cloud infrastructure enumeration activities. Specifically, the rule captures events from AWS CloudTrail logs that show potentially malicious behavior aimed at discovering details about EC2 instances. By analyzing API calls such as 'GetConsoleScreenshot', 'GetLaunchTemplateData', 'DescribeInstanceTypes', 'DescribeBundleTasks', 'DescribeInstanceAttribute', and 'DescribeReplaceRootVolumeTasks', security assessments can identify unauthorized attempts to gather information about the AWS environment. This detection leverages CloudTrail logs from the last two hours, thus providing timely alerts for ongoing enumeration attempts. The rule is particularly important for recognizing threats from first-known actors associated with enumeration tactics, providing enhanced situational awareness to cloud security teams.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Network Traffic
ATT&CK Techniques
- T1580
Created: 2024-02-09