Skip to content

Latest commit

 

History

History
37 lines (30 loc) · 1.14 KB

MATCH-S00670.md

File metadata and controls

37 lines (30 loc) · 1.14 KB

Rules: AWS Config Service Tampering

Description

Detects various AWS Config API actions that involve the alternation of a Config service.

Additional Details

Detail Value
Type Templated Match
Category Defense Evasion
Apply Risk to Entities device_ip, user_username, srcDevice_ip, device_hostname, srcDevice_hostname
Signal Name AWS Config Service Tampering - {{action}}
Summary Expression {{action}} performed by user: {{user_username}}
Score/Severity Static: 6
Enabled by Default True
Prototype False
Tags _mitreAttackTechnique:T1562, _mitreAttackTactic:TA0005, _mitreAttackTechnique:T1562.008, _mitreAttackTechnique:T1562.001

Vendors and Products

Fields Used

Origin Field
Normalized Schema action
Normalized Schema application
Normalized Schema device_hostname
Normalized Schema device_ip
Normalized Schema listMatches
Normalized Schema metadata_product
Normalized Schema metadata_vendor
Normalized Schema srcDevice_hostname
Normalized Schema srcDevice_ip
Normalized Schema user_username