heroui logo

AWS EC2 Security Group Configuration Change

Elastic Detection Rules

View Source
Summary
The rule aims to detect changes to AWS Security Group configurations, serving an important role akin to virtual firewalls in Amazon EC2 environments. Modifications in security group settings can provide unauthorized access to threat actors, thus the detection focuses on modifications that might indicate potential security breaches. It analyzes relevant AWS CloudTrail logs to track actions like creating or modifying security groups and scrutinizes the context of such changes, including user identities and specific actions taken to identify suspicious activities. The rule accounts for false positives from legitimate administrative changes while emphasizing the need for investigation when changes are made by unfamiliar users or systems. The output of the detection is designed to aid in immediate response actions, including quarantining affected resources and reverting unauthorized modifications, thereby reinforcing the organization's security posture against potential threats.
Categories
  • Cloud
  • AWS
  • Kubernetes
  • Containers
Data Sources
  • Cloud Service
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1562
  • T1562.007
Created: 2021-05-05