heroui logo

ASL AWS EC2 Snapshot Shared Externally

Splunk Security Content

View Source
Summary
This detection rule identifies unauthorized public sharing of AWS EC2 snapshots by monitoring AWS CloudTrail logs. Specifically, it looks for events where the permissions on snapshots are modified to allow public access or third-party sharing outside the originating AWS account. Such activities pose a high risk of data exfiltration, as sensitive data could be accessed by unintended recipients. By leveraging the `ModifySnapshotAttribute` API operation, the rule analyzes logs to pinpoint when snapshots are shared publicly, which can indicate potential security breaches or data leaks. If this activity is confirmed to be malicious, it can lead to further exploitation of compromised data, making this detection essential for maintaining cloud security.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Cloud Service
ATT&CK Techniques
  • T1537
Created: 2024-12-17