heroui logo

AWS SES Enumeration

Anvilogic Forge

View Source
Summary
This detection rule identifies potential IAM enumeration activities within the AWS environment, specifically by monitoring AWS CloudTrail logs for AWS API calls. It focuses on the 'GetAccount' and 'ListIdentities' events which may suggest that an attacker is trying to enumerate permissions or identities in an AWS account. The rule checks for these events that have occurred within the last two hours, indicating recent enumeration attempts. This proactive approach helps in recognizing the presence of reconnaissance behaviors potentially linked to unauthorized access or privilege escalation threats.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1069
  • T1087
Created: 2024-02-09