cloudtrail

Classification:

attack

Tactic:

Technique:

Framework:

cis

Control:

cis-3.10

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when an AWS security group is opened to the world.

Strategy

Monitor CloudTrail and detect when an AWS security group has been created or modified with one of the following API calls:

This rule inspects the @requestParameters.ipPermissions.items.ipRanges.items.cidrIp array to determine if either of the strings are contained:

  • 0.0.0.0/0
  • ::/0

Triage and response

  1. Determine who the user was who made this API call.
  2. Contact the user and see if this was an API call which was made by the user.
  3. If the API call was not made by the user:
  • Rotate the user credentials and investigate what other API calls.
  • Determine what other API calls the user made which were not made by the user.

Changelog

18 March 2022 - Updated rule query.