
Summary
This detection rule identifies unusual modifications to AWS security groups performed by users within a 30-minute interval. By analyzing AWS CloudTrail logs, the rule searches for specific actions like modifications, deletions, or creations of security groups. Subsequently, it calculates the average and standard deviation of unique security group interactions for each user and applies a 3-sigma rule to flag anomalies. This is crucial for detecting potential account compromises or insider threats, where unauthorized alterations to security groups could expose sensitive resources or disrupt services.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Cloud Service
- Application Log
ATT&CK Techniques
- T1578
- T1578.005
Created: 2024-11-14