
Summary
This detection rule focuses on identifying malicious activities related to the manipulation of findings in AWS SecurityHub. The rule is designed to capture actions that modify or delete findings, which can indicate an attempt to evade detection mechanisms. It monitors specific API calls such as `BatchUpdateFindings`, `DeleteInsight`, `UpdateFindings`, and `UpdateInsight` within the AWS CloudTrail logs. When a user performs actions that match these criteria, particularly through the specified event source (`securityhub.amazonaws.com`), an alert is triggered. The rule is particularly sensitive to administrative actions that could be misused for evasion tactics. Appropriate conditions and user behavior are considered to minimize false positives, especially in environments like development and testing. The goal of this rule is to enhance security oversight by flagging unusual manipulative activities that could compromise the integrity of security findings in the AWS ecosystem.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Service
- Logon Session
- Network Traffic
Created: 2021-06-28