
Summary
The AWS EC2 Image Monitoring rule is designed to analyze AWS CloudTrail logs for actions related to EC2 images, specifically focusing on the management events that create images. This rule checks for the occurrence of specific EC2 image actions, such as 'CreateImage', using CloudTrail logs that contain records of API calls made against the EC2 service. It assesses if these actions were performed by legitimate users or services with appropriate permissions in the AWS environment, as indicated by successful or failed event results. The rule collects logs that encompass various properties like event ID, time, source IP, user identity, and request parameters to determine if any suspicious activities are associated with image creation, which could indicate malicious intent or misconfigured permissions in an AWS environment. Based on its analysis, the rule also references the relevant AWS IAM permissions and alerts users to verify whether the actions are genuinely authorized or potentially part of a security breach.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1204
Created: 2022-11-01