heroui logo

Cloud Provisioning Activity From Previously Unseen Region

Splunk Security Content

View Source
Summary
This detection rule focuses on identifying cloud provisioning activities originating from unusual or previously unseen geographic regions. By analyzing AWS CloudTrail logs, the rule detects events where resources are either started or created. It cross-references these occurrences against a baseline of known regions to highlight any anomalous activities that could suggest potential unauthorized access, misuse, or malicious behavior within cloud environments. If confirmed malicious, such activity poses risks including unauthorized resource creation and data exfiltration. The search involves filtering for successful actions, geographic location identification via IP, and ensuring that the detected activity does not stem from previously recognized regions, thereby raising an alert for further investigation.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Storage
  • Network Traffic
ATT&CK Techniques
  • T1078
Created: 2024-11-14