Detecting AWS suspicious provisioning activities
You are an Amazon Web Services (AWS) admin who manages access to AWS resources and services across your organization. You need to monitor your AWS provisioning activities for behaviors originating from unfamiliar or unusual locations. These behaviors may indicate that malicious activities are occurring somewhere within your network.
Because most enterprise AWS activities originate from familiar geographic locations, activity from unknown or unusual regions is an important security measure. This indicator can be especially useful in environments where it is impossible to create allow lists for specific IP addresses because they vary.
These searches are designed to give you flexibility in specifying legitimate geographic regions. You can be as specific as an IP address or a city, or as broad as a region or state or an entire country.
These searches allow you to detect adversaries as they begin to probe your environment. Be aware that there are legitimate reasons for activities from unfamiliar locations, so these searches are not a standalone indicator. However, these searches can still provide you with location information that you may wish to investigate further.
Data required
- Amazon Web Services: CloudTrail and CloudWatch
How to use Splunk software for this use case
Next steps
If you are a Splunk Enterprise Security customer, you can also get help from the Security Research team's support options on GitHub.
In addition, Splunk Enterprise Security provides a number of other searches to help reinforce your cloud security posture, including:
- Use Case: Monitoring user activity spikes in AWS
- Use Case: Monitoring AWS S3 for suspicious activities