heroui logo

AWS RDS Manual/Public Snapshot Created

Panther Rules

View Source
Summary
This rule detects the creation of manual or public snapshots in AWS RDS (Relational Database Service). An attacker may create a manual snapshot to exfiltrate sensitive database content to another AWS account. The rule monitors AWS CloudTrail logs to identify any `CreateDBSnapshot` events with specified parameters that indicate a security risk. If a manual snapshot is discovered, the system recommends verifying if the snapshot is shared with a trusted AWS account; if not, the snapshot should be deleted and the IAM user who performed the action should be quarantined. The rule specifies that automated snapshots and AWS backup-created snapshots should not trigger alerts, focusing solely on manual and potentially public snapshots.
Categories
  • Cloud
  • AWS
  • Database
Data Sources
  • Cloud Storage
  • Application Log
ATT&CK Techniques
  • T1537
Created: 2023-12-13