Skip to content

IBEXDWM/detection-rules-aws-cloudtrail

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

Scanner Detection Rules - AWS CloudTrail

This repository contains Scanner detection rules for AWS CloudTrail logs.

Examples

Here are a few examples of the detections that are included in this repository:

  • Potential Bucket Enumeration on AWS
  • AWS RDS Master Password Change
  • Restore Public AWS RDS Instance
  • AWS GuardDuty Important Change

Event Sinks

When these detection rules are triggered, alerts are sent to the event sinks you have configured in Scanner. Depending on the alert's severity level, it will be sent to one of these event sink keys:

  • informational_severity_alerts
  • low_severity_alerts
  • medium_severity_alerts
  • high_severity_alerts
  • critical_severity_alerts
  • fatal_severity_alerts

Deployment

To deploy these rules into your Scanner instance, you can follow the instructions in the Scanner documentation under Detection Rules as Code.

About

Scanner detection rules for AWS CloudTrail logs.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published