heroui logo

AWS RDS Master Password Change

Sigma Rules

View Source
Summary
This detection rule identifies changes made to the master password of Amazon RDS instances, which can be a potential indicator of malicious activity, such as unauthorized access or data exfiltration. The rule operates by monitoring AWS CloudTrail logs specifically for events associated with modifications to DB instances, particularly focusing on the 'ModifyDBInstance' event. The detection criteria checks if the `masterUserPassword` in the response of the event contains any value, suggesting a password change. As password changes can also occur during routine maintenance or administrative tasks, the rule accounts for benign changes, making it important to investigate the context of the modification to filter false positives. The rule is designed to operate within AWS environments and is relevant for security teams monitoring for potential insider threats or compromised accounts.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
Created: 2020-02-12