
Summary
This detection rule is designed to monitor AWS CloudTrail logs for events related to traffic mirroring in Amazon EC2. The rule specifically captures multiple actions such as the creation of traffic mirror filters, filter rules, sessions, and targets. These events can indicate potential unauthorized network traffic monitoring or data exfiltration activities by malicious actors. Each suspicious action is logged, including details like AWS account IDs and event details, which are essential for further investigation. Depending on whether traffic is encrypted, the severity might be adjusted, with unencrypted traffic leading to a higher severity classification due to the elevated risk of data compromise. The analysis of user actions associated with these events is crucial to determine any suspicious behaviors and validate the appropriateness of the traffics being mirrored in the AWS environment. This requires investigation into both the context of the events as well as any related activities performed by the user, ensuring a comprehensive understanding of each case.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Network Traffic
ATT&CK Techniques
- T1040
Created: 2022-12-06