
Summary
This threat detection rule specifically targets the import and deletion of key material in AWS Key Management Service (KMS). The rationale behind monitoring these actions stems from their association with potential ransomware activities, where attackers may use the imported key material to encrypt data and hold it hostage. The detection mechanism relies on CloudTrail logs, focusing on events stemming from `kms.amazonaws.com` associated with the `ImportKeyMaterial` and `DeleteImportedKeyMaterial` actions. Given the rarity of legitimate use cases for these specific actions, this rule is poised to provide a high confidence signal when triggered. However, there are noted legitimate scenarios that may lead to false positives, including compliance-related imports in hybrid cloud setups or development environments that simulate key management practices. Organizations should evaluate the activity in the context of their specific operations to minimize disruptions from false positives while maintaining a robust security posture against potential ransomware threats.
Categories
- Cloud
Data Sources
- Cloud Service
- Logon Session
Created: 2025-10-18