Analytics Story: AWS Bedrock Security

Description

This analytic story contains detections that query your AWS CloudTrail and CloudWatch logs for activities related to potential security risks and malicious activities on Amazon Bedrock services.

Why it matters

Organizations increasingly leverage Amazon Bedrock to power their Generative AI (GenAI) applications. Adversaries with compromised AWS credentials can exploit Bedrock services and associated resources to perform malicious activities, extract sensitive data, or disrupt operations. Attackers often perform reconnaissance by repeatedly listing foundation models or making high volumes of API calls. They may attempt to evade detection by disabling logging configurations or deleting GuardRails that prevent harmful outputs. More sophisticated attacks include attaching manipulated training datasets for fine-tuning, deleting S3 buckets containing critical data, or performing LLM jacking where attackers compute their own responses to bypass security controls. This Analytic Story includes detections that identify suspicious activities against AWS Bedrock services, such as access denied events, spikes in GuardRail blocks, unusual API call patterns, configuration changes to logging, and manipulation of model security controls. These detections help organizations monitor for potential compromise of their Bedrock environment and identify attempts to bypass AI security measures through configuration changes or abuse of legitimate functionality.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
AWS Bedrock Delete GuardRails Disable or Modify Cloud Logs TTP
AWS Bedrock Delete Knowledge Base Data Destruction TTP
AWS Bedrock Delete Model Invocation Logging Configuration Disable or Modify Cloud Logs TTP
AWS Bedrock High Number List Foundation Model Failures Cloud Infrastructure Discovery TTP
AWS Bedrock Invoke Model Access Denied Valid Accounts, Use Alternate Authentication Material TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
AWS CloudTrail AWS icon AWS aws:cloudtrail aws_cloudtrail
AWS CloudTrail DeleteGuardrail AWS icon AWS aws:cloudtrail aws_cloudtrail
AWS CloudTrail DeleteKnowledgeBase AWS icon AWS aws:cloudtrail aws_cloudtrail
AWS CloudTrail DeleteModelInvocationLoggingConfiguration AWS icon AWS aws:cloudtrail aws_cloudtrail

References


Source: GitHub | Version: 1