
Summary
The AWS SecurityHub Finding Evasion rule is designed to detect attempts to modify or delete findings within AWS SecurityHub, which is critical for maintaining the integrity of security alerts. This rule leverages AWS CloudTrail logs to monitor specific event names associated with insight modifications such as 'CreateInsight', 'UpdateFindings', and 'DeleteInsight'. It triggers an alert if these events show anomalies that could indicate evasion tactics being employed by malicious actors. The expected outcomes for these events can determine whether the findings are being manipulated or if an unauthorized deletion is occurring, which could compromise security posture. This rule is assigned a high severity level due to the significant risks posed by potential tampering with security findings.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Application Log
ATT&CK Techniques
- T1562
Created: 2022-09-27