Rules: AWS Config Service Tampering
Detects various AWS Config API actions that involve the alternation of a Config service.
Detail | Value |
---|---|
Type | Templated Match |
Category | Defense Evasion |
Apply Risk to Entities | device_ip, user_username, srcDevice_ip, device_hostname, srcDevice_hostname |
Signal Name | AWS Config Service Tampering - {{action}} |
Summary Expression | {{action}} performed by user: {{user_username}} |
Score/Severity | Static: 6 |
Enabled by Default | True |
Prototype | False |
Tags | _mitreAttackTechnique:T1562, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1562.008, _mitreAttackTechnique:T1562.001 |
Origin | Field |
---|---|
Normalized Schema | action |
Normalized Schema | application |
Normalized Schema | device_hostname |
Normalized Schema | device_ip |
Normalized Schema | listMatches |
Normalized Schema | metadata_product |
Normalized Schema | metadata_vendor |
Normalized Schema | srcDevice_hostname |
Normalized Schema | srcDevice_ip |
Normalized Schema | user_username |