
Summary
The rule titled 'AWS Security Group Ingress Authorized' is designed to detect when an ingress rule is added to an AWS security group. Such rules allow Amazon EC2 instances to receive traffic from specified IP address ranges or other instances linked to specific security groups. The detection logic is implemented in Splunk, leveraging the 'get_cloud_data' and 'get_cloud_data_aws' functions alongside a filter for the event 'AuthorizeSecurityGroupIngress'. The output is formatted into a table containing various fields including timestamps, source IP addresses, user identities, and associated security event metadata. The rule groups the results statistically by source IP and time, enabling detection of potential unauthorized access configurations through changes in security group settings.
The primary technique this rule addresses falls under persistence account manipulation (T1098), indicating that unauthorized changes could establish persistent access for malicious entities. The data categorized for this rule is sourced from AWS CloudTrail logs, essential for tracking and auditing changes within AWS environments. The rule references external documentation for AWS security group operations and an incident analysis provided by Palo Alto Networks, supporting its relevance in threat detection and response.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Network Traffic
ATT&CK Techniques
- T1098
Created: 2024-02-09