heroui logo

ECS Create Cluster

Anvilogic Forge

View Source
Summary
This rule monitors the utilization of the AWS API action "CreateCluster" within Amazon Elastic Container Service (ECS). The detection logic is designed to identify potentially unauthorized or malicious activities related to the creation of ECS clusters. It inspects events for specific anomalies, such as unexpected source IP addresses or unusual frequencies of the "CreateCluster" API calls, which can signal an adversary's attempt to leverage AWS resources for deploying unauthorized containers. By aggregating relevant details from the AWS CloudTrail logs, the rule provides insights into the operating context of the API call, including user attributes and geolocation of the source IP. This is essential for security teams to detect and investigate potential threats to their cloud infrastructure, especially in the context of container orchestration.
Categories
  • Cloud
  • AWS
  • Containers
  • Infrastructure
Data Sources
  • Cloud Storage
  • Cloud Service
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1610
Created: 2024-02-09