Account Enumeration on AWS
Detects enumeration of accounts configuration via api call to list different instances and services within a short period of time.
Sigma rule (View on GitHub)
1title: Account Enumeration on AWS
2id: e9c14b23-47e2-4a8b-8a63-d36618e33d70
3status: unsupported
4description: Detects enumeration of accounts configuration via api call to list different instances and services within a short period of time.
5author: toffeebr33k
6date: 2020/11/21
7modified: 2023/03/24
8tags:
9 - attack.discovery
10 - attack.t1592
11logsource:
12 product: aws
13 service: cloudtrail
14detection:
15 selection_eventname:
16 eventName: list*
17 timeframe: 10m
18 condition: selection_eventname | count() > 50
19fields:
20 - userIdentity.arn
21falsepositives:
22 - AWS Config or other configuration scanning activities
23level: low
Related rules
- Enumeration via the Global Catalog
- Network Scans Count By Destination IP
- Network Scans Count By Destination Port
- Potential Backup Enumeration on AWS
- Potential Network Enumeration on AWS