
Summary
This rule detects suspicious modifications to AWS AMI (Amazon Machine Image) attributes that could be leveraged for exfiltration of sensitive data. Monitoring specific API calls related to the modification of AMI attributes through AWS CloudTrail logs allows for the identification of potentially dangerous activities, such as sharing an AMI with other AWS accounts or making an AMI publicly accessible. Such actions are usually characteristic of malicious intent, as attackers could exploit them to access sensitive data stored within AWS. By tracking these modifications, organizations can mitigate risks associated with unauthorized access and data breaches, ensuring the confidentiality and integrity of their cloud resources.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Cloud Service
- User Account
ATT&CK Techniques
- T1537
Created: 2024-11-14