| AWS Config Service Resource Deletion Attempts |
Low |
DefenseEvasion |
AWSCloudTrail |
| AWS Guard Duty Alert |
Medium |
- |
AWSGuardDuty |
| Automatic image scanning disabled for ECR |
Medium |
DefenseEvasion |
AWSCloudTrail |
| Changes made to AWS CloudTrail logs |
Low |
DefenseEvasion |
AWSCloudTrail |
| Changes to AWS Elastic Load Balancer security groups |
Low |
Persistence |
AWSCloudTrail |
| Changes to AWS Security Group ingress and egress settings |
Low |
Persistence |
AWSCloudTrail |
| Changes to Amazon VPC settings |
Low |
PrivilegeEscalation, LateralMovement |
AWSCloudTrail |
| Changes to internet facing AWS RDS Database instances |
Low |
Persistence |
AWSCloudTrail |
| CloudFormation policy created then used for privilege escalation |
High |
PrivilegeEscalation |
AWSCloudTrail |
| Created CRUD S3 policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creating keys with encrypt policy without MFA |
Medium |
Impact |
AWSCloudTrail |
| Creation of Access Key for IAM User |
Medium |
Persistence |
AWSCloudTrail |
| Creation of CRUD DynamoDB policy and then privilege escalation. |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of CRUD KMS policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of CRUD Lambda policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of DataPipeline policy and then privilege escalation. |
High |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of EC2 policy and then privilege escalation |
High |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of Glue policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of Lambda policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of SSM policy and then privilege escalation |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Creation of new CRUD IAM policy and then privilege escalation. |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| EC2 Startup Shell Script Changed |
Medium |
Execution |
AWSCloudTrail |
| ECR image scan findings high or critical |
High |
Execution |
AWSCloudTrail |
| Full Admin policy created and then attached to Roles, Users or Groups |
Medium |
PrivilegeEscalation, DefenseEvasion |
AWSCloudTrail |
| GuardDuty detector disabled or suspended |
High |
DefenseEvasion |
AWSCloudTrail |
| Login to AWS Management Console without MFA |
Low |
DefenseEvasion, PrivilegeEscalation, Persistence, InitialAccess |
AWSCloudTrail |
| Monitor AWS Credential abuse or hijacking |
Low |
Discovery |
AWSCloudTrail |
| NRT Login to AWS Management Console without MFA |
Low |
DefenseEvasion, PrivilegeEscalation, Persistence, InitialAccess |
AWSCloudTrail |
| Network ACL with all the open ports to a specified CIDR |
High |
DefenseEvasion |
AWSCloudTrail |
| Policy version set to default |
Medium |
InitialAccess |
AWSCloudTrail |
| Privilege escalation via CRUD DynamoDB policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via CRUD IAM policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via CRUD KMS policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via CRUD Lambda policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via CRUD S3 policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via CloudFormation policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via DataPipeline policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via EC2 policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via Glue policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via Lambda policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation via SSM policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation with AdministratorAccess managed policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation with FullAccess managed policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| Privilege escalation with admin managed policy |
Medium |
PrivilegeEscalation |
AWSCloudTrail |
| RDS instance publicly exposed |
Medium |
Exfiltration |
AWSCloudTrail |
| S3 Object Exfiltration from Anonymous User |
Medium |
Collection |
AWSCloudTrail |
| S3 bucket access point publicly exposed |
Medium |
Exfiltration |
AWSCloudTrail |
| S3 bucket exposed via ACL |
Medium |
Exfiltration |
AWSCloudTrail |
| S3 bucket exposed via policy |
Medium |
Exfiltration |
AWSCloudTrail |
| S3 bucket suspicious ransomware activity |
High |
Impact |
AWSCloudTrail |
| S3 object publicly exposed |
Medium |
Exfiltration |
AWSCloudTrail |
| SAML update identity provider |
High |
Persistence |
AWSCloudTrail |
| SSM document is publicly exposed |
Medium |
Discovery |
AWSCloudTrail |
| Successful API executed from a Tor exit node |
High |
Execution |
AWSCloudTrail |
| Successful brute force attack on S3 Bucket. |
High |
DefenseEvasion |
AWSCloudTrail |
| Suspicious AWS CLI Command Execution |
Medium |
Reconnaissance |
AWSCloudTrail |
| Suspicious AWS EC2 Compute Resource Deployments |
Medium |
Impact |
AWSCloudTrail |
| Suspicious command sent to EC2 |
High |
Execution |
AWSCloudTrail |
| Suspicious overly permissive KMS key policy created |
High |
Impact |
AWSCloudTrail |
| Tampering to AWS CloudTrail logs |
High |
DefenseEvasion |
AWSCloudTrail |
| Unauthorized EC2 Instance Setup Attempt |
Medium |
ResourceDevelopment |
AWSCloudTrail |
| User IAM Enumeration |
Medium |
Discovery |
AWSCloudTrail |