
Summary
This rule is designed to detect unauthorized restoration of Amazon RDS (Relational Database Service) database instances using specific AWS API calls. It monitors successful restoration attempts via the `RestoreDBInstanceFromDBSnapshot` and `RestoreDBInstanceFromS3` APIs. The motivation behind this detection is due to potential adversary behavior, where compromised credentials may allow adversaries to restore databases for accessing sensitive information or evading security measures. The rule relies on specific events logged in AWS CloudTrail, allowing for real-time detection of such actions. Keywords include AWS, cloud security, RDS, data exfiltration, and incident response, which align the rule with broader cloud security initiatives and operational awareness.
Categories
- Cloud
- AWS
- Database
- Infrastructure
Data Sources
- Cloud Storage
- Network Traffic
- Application Log
- Logon Session
- Process
ATT&CK Techniques
- T1578
- T1578.002
- T1578.004
Created: 2021-06-29