
Summary
This detection rule monitors for potentially unauthorized modifications made to AWS resources, specifically the API calls `ModifyInstanceAttribute`, `ModifyDBSnapshotAttribute`, and `ModifySnapshotAttribute`. These functions are crucial for changing configurations and access permissions associated with Amazon EC2 instances and various types of snapshots. Misuse of these API calls can result in unauthorized access, leading to possible lateral movement within the AWS environment, data exfiltration, or establishing persistent access for malicious users. The rule is implemented using Splunk's querying capabilities, where it looks for occurrences of the aforementioned API calls in AWS CloudTrail logs. It collates relevant information such as the timestamp, user identity, source IP, and request parameters to help identify potential malicious activities. By parsing through this data, security teams can react to potential threats and strengthen their response mechanisms to safeguard sensitive resources.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
ATT&CK Techniques
- T1578
Created: 2024-02-09