
Summary
This rule identifies the importation of SSH key pairs into Amazon Web Services (AWS) EC2, which could signify an unauthorized attempt to access EC2 instances. Such actions may suggest an initial access phase by an attacker, with the potential for establishing persistence or escalating privileges within the AWS environment. Unauthorized key imports can compromise sensitive data and operational integrity within cloud instances, making this detection rule crucial for security monitoring.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
Created: 2024-12-19