
Summary
The 'AWS Exfiltration via Batch Service' detection rule identifies potential abuse of the AWS Batch service for data exfiltration through the use of AWS S3 Bucket Replication. By monitoring AWS CloudTrail logs, particularly the 'JobCreated' event, this rule captures instances where users create batch jobs that could exploit these AWS features to move data between S3 buckets without authorization. The rule specifically analyzes the job's details and status to determine if malicious intent is present. If utilized by an attacker, these capabilities may facilitate data breaches, leading to unauthorized data transfers and loss of sensitive information. Legitimate team activities can result in false positives; hence, due diligence is required to validate flagged incidents. Critical best practices involve implementing this analytic within Splunk with the necessary AWS add-ons to enable effective monitoring, logging, and analytics of AWS actions related to S3 and AWS Batch services.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Cloud Service
ATT&CK Techniques
- T1119
Created: 2024-11-14