AWS Glue Development Endpoint Activity
Detects possible suspicious glue development endpoint activity.
Sigma rule (View on GitHub)
1title: AWS Glue Development Endpoint Activity
2id: 4990c2e3-f4b8-45e3-bc3c-30b14ff0ed26
3status: test
4description: Detects possible suspicious glue development endpoint activity.
5references:
6 - https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
7 - https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html
8author: Austin Songer @austinsonger
9date: 2021-10-03
10modified: 2022-12-18
11tags:
12 - attack.privilege-escalation
13logsource:
14 product: aws
15 service: cloudtrail
16detection:
17 selection:
18 eventSource: 'glue.amazonaws.com'
19 eventName:
20 - 'CreateDevEndpoint'
21 - 'DeleteDevEndpoint'
22 - 'UpdateDevEndpoint'
23 condition: selection
24falsepositives:
25 - Glue Development Endpoint Activity may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
26 - If known behavior is causing false positives, it can be exempted from the rule.
27level: low
References
Related rules
- ADCS Certificate Template Configuration Vulnerability
- ADCS Certificate Template Configuration Vulnerability with Risky EKU
- APT PRIVATELOG Image Load Pattern
- AWS Attached Malicious Lambda Layer
- AWS Root Credentials