
Summary
This rule leverages machine learning to detect unusual AWS command activity originating from atypical geolocations. It recognizes that many AWS commands might appear benign but can indicate compromised credentials if they originate from unexpected countries. The threshold for flagging these anomalies is set at an anomaly score of 50, suggesting a moderate level of concern. The rule suggests detailed investigation steps, which include examining the user identity associated with the activity, scrutinizing related alerts, and validating the user's authorized locations and actions. Possible false positives include legitimate activities of new employees or changes due to new regional services. In case of a detected anomaly, a structured incident response plan is recommended, including immediate assessment and remediation tasks to ensure the security of AWS accounts.
Categories
- Cloud
Data Sources
- Cloud Service
- Network Traffic
- Application Log
Created: 2020-07-13