
Summary
This detection rule monitors for sign-in events to AWS via the AWS CLI prompt, leveraging AWS CloudTrail logs to identify suspicious or unauthorized access attempts. The rule is triggered specifically by the 'ListApplications' event from the SSO (Single Sign-On) service, which indicates a user attempting to list applications after a successful sign-in. The primary goal of this rule is to ensure that sign-ins are legitimate and to flag any anomalous sign-in activities coming from unlikely sources. It generates an informational log but does not create alerts, enabling monitoring without overwhelming alerts for normal operations. A 60-minute deduplication period is set to minimize duplicate notifications for recurrent legitimate actions within this timeframe. The logs required for this rule must include details such as the event source, event name, time of the event, and the user identity to accurately validate the behavior being monitored. Overall, this rule serves as an early detection mechanism for potential credential misuse or unauthorized sign-ins in an AWS environment.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
- User Account
- Network Traffic
Created: 2024-07-15