
Summary
This detection rule monitors AWS CloudTrail logs to identify instances where a user has terminated an unusually high number of AWS EC2 instances in a specified timeframe. By querying for successful `TerminateInstances` eventName entries, the rule applies an anomaly detection filter to determine if the number of terminated instances exceeds a predefined threshold. The rule is designed to help identify potential misuse or misconfiguration related to user actions in the AWS environment. However, it is marked as deprecated, having been replaced by an updated approach using the Change Data Model. Consequently, users should consider implementing the new detection method instead. The existing setup involves utilizing the Splunk AWS App and appropriate add-ons to ensure proper event collection and analysis.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1078.004
Created: 2024-11-14