Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@
creation_date = "2024/04/14"
integration = ["aws"]
maturity = "production"
updated_date = "2025/01/27"
updated_date = "2025/02/03"

[rule]
author = ["Elastic"]
description = """
Identifies discovery request `DescribeInstanceAttribute` with the attribute userData and instanceId in AWS CloudTrail
logs. This may indicate an attempt to retrieve user data from an EC2 instance. Adversaries may use this information to
gather sensitive data from the instance such as hardcoded credentials or to identify potential vulnerabilities. This is
a [New Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that
a [New Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that
identifies when `aws.cloudtrail.user_identity.arn` requests the user data for a specific
`aws.cloudtrail.flattened.request_parameters.instanceId` from an EC2 instance in the last 14 days.
"""
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,15 +2,15 @@
creation_date = "2021/06/05"
integration = ["aws"]
maturity = "production"
updated_date = "2025/01/27"
updated_date = "2025/02/03"

[rule]
author = ["Elastic", "Austin Songer"]
description = """
Identifies AWS CloudTrail events where an EC2 route table or association has been modified or deleted. Route table or
association modifications can be used by attackers to disrupt network traffic, reroute communications, or maintain
persistence in a compromised environment. This is a [New
Terms](https://www.elastic.co/guide/en/security/master/rules-ui-create.html#create-new-terms-rule) rule that detects the
Terms](https://www.elastic.co/guide/en/security/current/rules-ui-create.html#create-new-terms-rule) rule that detects the
first instance of this behavior by the `aws.cloudtrail.user_identity.arn` field in the last 10 days.
"""
false_positives = [
Expand Down
Loading