
Summary
The "Rare AWS Error Code" detection rule utilizes machine learning techniques to identify unusual errors within AWS CloudTrail messages, which can signify malicious activities such as privilege escalation, persistence, or lateral movement. Set to analyze CloudTrail logs, the rule runs every 15 minutes and adopts a threshold of 50 anomalies to trigger alerts. The setup process mandates installation of the associated machine learning jobs and proper integration with AWS via the Elastic Agent to efficiently collect logs and metrics. Analysts are advised to evaluate the context of detected errors, cross-referencing with user activity and potential automation deployments, ensuring that legitimate troubleshooting or changes do not lead to false positives. This proactive monitoring is crucial for maintaining security in cloud environments by enabling swift incident response and minimizing risks associated with potentially compromised accounts.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Logon Session
- Network Traffic
- User Account
- Application Log
Created: 2020-07-13