
Summary
The AWS ECR Events rule identifies actions taken within Amazon Elastic Container Registry (ECR) that occur outside of anticipated accounts or regions. Specifically, the rule focuses on incidents where the specified repository or image push event is initiated either by authorized IAM users from an unauthorized region or by users from unauthorized accounts. The intention is to catch potentially malicious actions in a multi-account AWS environment, especially where access governance might not be tightly controlled. Events that get flagged include those that may indicate credential misuse or compromised accounts attempting to manipulate container images or repositories. The rule is essential for maintaining security within AWS environments that leverage containerization under ECR, ensuring compliance and integrity of registries against unauthorized access or anomalous activities.
Categories
- Cloud
- AWS
Data Sources
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1535
Created: 2022-10-03