
Summary
This detection rule utilizes a machine learning job to identify unusual AWS API commands executed by a user who does not typically utilize those commands. It indicates potential compromise of credentials or misuse of valid accounts for unauthorized activities such as lateral movement or data exfiltration. The rule is initiated from a historical analysis of user behavior, and it flags API commands that, while not inherently suspicious, are executed in an uncommon context for the associated user. The setup requires installation of specific machine learning jobs and integration with AWS logs. Alerting occurs every 15 minutes, and it's recommended to analyze the context of the user, the command invoked, and any associated unusual activity to properly assess the alert. Valid false positives may arise from new user activity, changes in automation, or legitimate reconfigurations. Investigation should include reviewing user behavior over recent days, verification of the user’s awareness of command execution, and confirmation with the user's operational context. Proper incident response measures must be taken if a compromise is suspected, which includes limiting account access, evaluating affected resources, and implementing security best practices.
Categories
- Cloud
Data Sources
- Cloud Service
- Network Traffic
- Application Log
- User Account
- Process
Created: 2020-07-13