heroui logo

AWS Describe Organization

Anvilogic Forge

View Source
Summary
The rule titled 'AWS Describe Organization' is designed to detect unauthorized access attempts to retrieve organization details in AWS environments. It focuses on the use of the `DescribeOrganization` API call, which reveals pertinent information about the organizational structure in AWS, including the master account ID and email. This behavior is a known discovery technique used by adversaries to gather information about the target’s cloud environment. The detection logic utilizes Splunk queries to monitor AWS CloudTrail logs, specifically targeting events where the `DescribeOrganization` API is invoked. The results include a structured representation of the event details such as timestamps, source IP addresses, user accounts, and geographic information derived from the source IPs, enabling security analysts to assess whether the requests were legitimate or indicative of reconnaissance activities. This rule applies the 'discovery:system information discovery' technique (T1082) as outlined by the MITRE ATT&CK framework, which catalogs methods used by threat actors to understand the environment they are targeting, making it essential for monitoring and securing AWS environments.
Categories
  • Cloud
  • AWS
Data Sources
  • Cloud Service
  • Cloud Storage
  • Network Traffic
ATT&CK Techniques
  • T1082
Created: 2024-02-09