- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Classification:
attack
Tactic:
Technique:
Detect when there is an attempt to invite an AWS account to an AWS organization.
This rule allows you to monitor CloudTrail and detect if an attacker has attempted to invite an AWS account to an AWS organization. An attacker may attempt add an attacker controlled AWS account to a compromised AWS organization to evade the existing defenses of the organization.
This operation can be called only from the organization’s management account.
{{@userIdentity.arn}}
should have made a {{@evt.name}}
API call.@requestParameters.target.id
to retrieve the account invited. This maybe in the form of an AWS account ID or email address.{{@userIdentity.arn}}
using the Cloud SIEM - User Investigation dashboard.