heroui logo

Unusual City For an AWS Command

Elastic Detection Rules

View Source
Summary
The detection rule "Unusual City For an AWS Command" is designed to identify potentially suspicious AWS command activity based on the geographical location from which the command is executed. Utilizing machine learning, the rule analyzes AWS command usage patterns to flag instances where commands are being executed from an unusual geolocation. This activity could indicate compromised credentials or keys, as it deviates from the typical geographical locations associated with the authorized users. False positives may arise due to legitimate variations such as employees traveling, the use of new automation scripts, or changes in user geolocation norms due to remote work policies. The rule operates by monitoring logs from AWS, specifically AWS CloudTrail, which tracks user activity within the AWS environment. Its implementation requires the associated machine learning jobs to be properly set up and running, allowing the automation of anomaly detection based on user command behavior. The detection alert assists security teams in responding to potential threats by suggesting various investigative steps, such as reviewing user actions, examining command parameters, and validating whether the activity aligns with known user behaviors. The process of triaging and analyzing any alerts generated by this rule precedes further actions to mitigate any risks associated with the detected activity, including incident response and potential credential reset procedures.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Network Traffic
Created: 2020-07-13