Detectionmediumtest
AWS RDS Master Password Change
Detects the change of database master password. It may be a part of data exfiltration.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
AWScloudtrail
ProductAWS← raw: aws
Servicecloudtrail← raw: cloudtrail
Detection Logic
Detection Logic1 selector
detection:
selection_source:
eventSource: rds.amazonaws.com
responseElements.pendingModifiedValues.masterUserPassword|contains: '*'
eventName: ModifyDBInstance
condition: selection_sourceFalse Positives
Benign changes to a db instance
References
MITRE ATT&CK
Tactics
Techniques
Rule Metadata
Rule ID
8a63cdd4-6207-414a-85bc-7e032bd3c1a2
Status
test
Level
medium
Type
Detection
Created
Wed Feb 12
Modified
Wed Oct 05
Author
Path
rules/cloud/aws/cloudtrail/aws_rds_change_master_password.yml
Raw Tags
attack.exfiltrationattack.t1020