
Summary
The AWS Software Discovery rule identifies potential reconnaissance activities by monitoring API calls that retrieve information regarding security software, configurations, and defensive tools within AWS environments. This rule targets events that include describing security groups, which is a common initial step for adversaries looking to map an organization's security posture in AWS. By observing API calls to services such as EC2 and DynamoDB, the rule distinguishes between legitimate discovery actions and potentially malicious behavior. The rule is particularly focused on filtering out unwanted events and providing insights into significant API calls that could indicate security assessments or probing by unauthorized entities. The rule is enabled under specific configurations and tailored for user account access in designated AWS regions. Notably, it employs a deduplication mechanism to ensure alerts are not raised excessively and requires structured AWS CloudTrail logs for operational effectiveness. Additionally, it sets a threshold to maintain focus on prevalent events that could impact security planning and response efforts.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1518
Created: 2023-01-25