
Summary
This detection rule monitors changes to the Amazon Macie service, specifically focusing on events that indicate either the disabling of Macie or modifications to its configuration. Amazon Macie is a crucial service deployed in AWS environments, aimed at identifying and protecting sensitive data within AWS S3 buckets. It detects policy violations, such as unencrypted buckets, that could lead to data breaches. If an unauthorized user disables Macie, it can hinder the detection of data exfiltration efforts. The rule utilizes AWS CloudTrail logs to track and analyze events related to the management of Macie, specifically looking for high-risk changes by tracking the 'ListMembers' and 'UpdateMacieSession' API calls. The monitoring period is set for 60 minutes, during which a threshold of five unauthorized or abnormal events will trigger an alert, facilitating immediate investigation and remediation actions by security teams.
Categories
- Cloud
- AWS
- Infrastructure
Data Sources
- Cloud Storage
- Application Log
- Network Traffic
ATT&CK Techniques
- T1562
Created: 2022-09-29