
Summary
The rule "CloudTrail EC2 StopInstances" monitors Amazon EC2 instance stop actions logged in AWS CloudTrail. This rule is designed to trigger when CloudTrail records an event indicating that one or more EC2 instances have been stopped. Such events may indicate administrative actions or potentially unwanted changes, hence being categorized under informational alerts. The rule does not create alerts on its own but can be integrated into a broader security monitoring system. The events monitored by the rule record critical information such as the user who initiated the action, the instance IDs that were stopped, and various contextual details regarding the API call made to stop the instances. It leverages log data from AWS CloudTrail, specifically filtering events with the name 'StopInstances' and considering the identity of the user initiating the stop command. Tests include checking for the stopping of instances as well as ensuring that no start actions occur around the same time, helping detect unauthorized instance operations.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Application Log
- Logon Session
Created: 2024-07-09