- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detect a user attempting to exfiltrate an Amazon EC2 AMI Snapshot.
This rule lets you monitor the ModifyImageAttribute CloudTrail API calls to detect when an Amazon EC2 AMI snapshot is made public or shared with an AWS account.
This rule also inspects:
@requestParameters.launchPermission.add.items.group
array to determine if the string all
is contained. This is the indicator which means the RDS snapshot is made public.@requestParameters.launchPermission.add.items.userId
array to determine if the string *
is contained. This is the indicator which means the RDS snapshot was shared with a new or unknown AWS account.{{@userIdentity.arn}}
intended to make the RDS snaphsot public.