SigmaHQ/rules/cloud/aws_snapshot_backup_exfiltration.yml
2021-05-17 13:00:01 -07:00

25 lines
679 B
YAML

title: AWS Snapshot Backup Exfiltration
id: abae8fec-57bd-4f87-aff6-6e3db989843d
status: test
description: Detects the modification of an EC2 snapshot's permissions to enable access from another account
author: Darin Smith
date: 2021/05/17
references:
- https://www.justice.gov/file/1080281/download
- https://attack.mitre.org/techniques/T1537/
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- ModifySnapshotAttribute
condition: selection_source AND events
falsepositives:
- Valid change to a snapshot's permissions
level: medium
tags:
- attack.exfiltration
- attack.t1537