Analytics Story: Suspicious Cloud Authentication Activities

Description

Monitor your cloud authentication events. Searches within this Analytic Story leverage the recent cloud updates to the Authentication data model to help you stay aware of and investigate suspicious login activity.

Why it matters

It is important to monitor and control who has access to your cloud infrastructure. Detecting suspicious logins will provide good starting points for investigations. Abusive behaviors caused by compromised credentials can lead to direct monetary costs, as you will be billed for any compute activity whether legitimate or otherwise. This Analytic Story has data model versions of cloud searches leveraging Authentication data, including those looking for suspicious login activity, and cross-account activity for AWS.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Detect AWS Console Login by New User Unsecured Credentials, Cloud Accounts Hunting
Detect AWS Console Login by User from New City Unused/Unsupported Cloud Regions, Cloud Accounts Hunting
Detect AWS Console Login by User from New Country Unused/Unsupported Cloud Regions, Cloud Accounts Hunting
Detect AWS Console Login by User from New Region Unused/Unsupported Cloud Regions, Cloud Accounts Hunting
AWS Cross Account Activity From Previously Unseen Account None Anomaly

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
AWS CloudTrail AWS icon AWS aws:cloudtrail aws_cloudtrail

References


Source: GitHub | Version: 2