heroui logo

AWS Bedrock Delete GuardRails

Splunk Security Content

View Source
Summary
The AWS Bedrock Delete GuardRails analytic rule is designed to detect attempts to delete AWS Bedrock GuardRails, which are security measures that safeguard against harmful, biased, or inappropriate outputs from AI models. It utilizes AWS CloudTrail logs to monitor for calls to the DeleteGuardrail API by users or services. The significance of this detection lies in its ability to highlight potential malicious activity wherein an adversary may try to disable these guardrails after gaining unauthorized access, enabling the potential generation of harmful AI outputs or the extraction of sensitive information. The analytic captures crucial details such as the user involved, source of the access, user agent, and the identifiers of the guardrails targeted. To implement this detection effectively, organizations must ensure that they have the necessary Splunk add-ons installed and configured to collect AWS CloudTrail logs, particularly those related to Bedrock services, and be prepared to assess the legitimacy of deletions against expected operational behaviors.
Categories
  • Cloud
  • AWS
  • Infrastructure
  • Application
  • Identity Management
Data Sources
  • Cloud Storage
  • Process
ATT&CK Techniques
  • T1562
  • T1562.008
Created: 2024-12-05