- 重要な情報
- はじめに
- 用語集
- ガイド
- エージェント
- インテグレーション
- OpenTelemetry
- 開発者
- API
- CoScreen
- アプリ内
- Service Management
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Detect a user attempting to exfiltrate data from an RDS Snapshot.
This rule lets you monitor ModifyDBClusterSnapshotAttribute CloudTrail API calls to detect when an RDS snapshot is made public or shared with an AWS account.
This rule also inspects the:
@requestParameters.valuesToAdd
array to determine if the string all
is contained. This is the indicator which means the RDS snapshot is made public.@requestParameters.attributeName
array to determine if the string restore
is contained. This is the indicator which means the RDS snapshot was shared with a new or unknown AWS Account.{{@userIdentity.arn}}
intended to make the RDS snaphsot public.11 October 2022 - Updated severity.