
Summary
This detection rule focuses on AWS Glue Development Endpoint activities that may indicate privilege escalation or unauthorized access. It specifically monitors events related to the AWS Glue service, particularly actions for creating, deleting, and updating development endpoints. The rule captures events sourced from AWS CloudTrail, which logs actions taken in the AWS environment. By examining these specific events—'CreateDevEndpoint', 'DeleteDevEndpoint', and 'UpdateDevEndpoint'—the rule aims to identify suspicious activities that could suggest a potential security breach or misuse of AWS resources. Given that legitimate users, such as system administrators, might perform these actions, the rule includes guidance on recognizing false positives, emphasizing the need to verify user identity, user agent, and hostname for context during alert investigation. Overall, it serves as a precautionary measure to protect AWS Glue environments from unauthorized modifications that may lead to privilege escalation.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Network Traffic
Created: 2021-10-03