heroui logo

AWS command executed on the command line

Panther Rules

View Source
Summary
The 'AWS command executed on the command line' rule detects the execution of AWS commands on Linux instances through osquery logs. This rule focuses on identifying unauthorized or malicious command line activities that involve AWS, which may indicate misconfigurations or security breaches, especially in cloud environments. It utilizes differential logging provided by osquery to monitor shell history and specifically looks for commands related to the AWS CLI. The rule carefully evaluates the context of the commands executed, filtering out irrelevant commands while focusing on potentially harmful activities such as accessing AWS resources improperly. If an AWS command is detected, it suggests further investigation by analyzing other commands executed in the same session and recommends removing problematic IAM roles related to the suspicious activity.
Categories
  • Endpoint
  • Cloud
  • Linux
Data Sources
  • Command
  • Logon Session
  • User Account
ATT&CK Techniques
  • T1204
  • T1078
Created: 2022-09-02