Suspicious AWS CLI Command Execution

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This detection focuses on identifying potentially suspicious activities involving the execution of AWS Command Line Interface (CLI) commands, particularly focusing on reconnaissance operations.

Attribute Value
Type Analytic Rule
Solution Amazon Web Services
ID 8c2dc344-9352-4ca1-8863-b1b7a5e09e59
Severity Medium
Kind Scheduled
Tactics Reconnaissance
Techniques T1595, T1592.004, T1589.002, T1589.003, T1590, T1591, T1596
Required Connectors AWS
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
AWSCloudTrail ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Amazon Web Services