
Summary
This detection rule identifies anomalous activity within the AWS GetObject API, indicative of potential data exfiltration from S3 buckets. Utilizing AWS CloudTrail logs, the analytic applies the `anomalydetection` command to discern unusual patterns based on the frequency of GetObject API calls, focusing on parameters such as 'count', 'user_type', and 'user_arn' over a 10-minute window. The rationale behind this monitoring is to flag unexpected access patterns which might suggest unauthorized data retrieval, thereby alerting to potential data breaches or compliance issues. The rule generates alerts when specific anomalies are detected, emphasizing the risk posed by potentially malevolent users seeking to exfiltrate sensitive information.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1119
- T1530
Created: 2024-11-14