heroui logo

ASL AWS Excessive Security Scanning

Splunk Security Content

View Source
Summary
The rule identifies excessive API activity from a single user within an AWS environment by analyzing AWS CloudTrail logs for operations that start with 'Describe', 'List', or 'Get'. This can indicate potential reconnaissance or misconfigured security settings, as it suggests that a user is scanning through various parts of the AWS environment repeatedly. The rule looks for distinct API operation calls and flags users for analysis if they exceed a threshold of 50 different operations. It collects details such as the user agent, source IP, and user account ID to aid in further investigation and response. Designed for integration with the Splunk platform, this detection relies on the Splunk Add-On for AWS and utilizes the Open Cybersecurity Schema Framework (OCSF) for log parsing, ensuring streamlined analysis across security tools.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Logon Session
ATT&CK Techniques
  • T1526
Created: 2024-11-14