Rule Library

Sigma Rules

3,332 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

RDS Database Security Group Modification

Detects changes to the security group entries for RDS databases. This can indicate that a misconfiguration has occurred which potentially exposes the database to the public internet, a wider audience within the VPC or that removal of valid rules has occurred which could impact the availability of the database to legitimate services and users.

AWScloudtrail
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
jamesc-grafanaThu Jul 11cloud
Detectionhightest

Potential Malicious Usage of CloudTrail System Manager

Detect when System Manager successfully executes commands against an instance.

AWScloudtrail
TA0004 · Privilege EscalationTA0001 · Initial AccessT1566 · PhishingT1566.002 · Spearphishing Link
jamesc-grafanaThu Jul 11cloud
Detectionhightest

AWS Config Disabling Channel/Recorder

Detects AWS Config Service disabling

AWScloudtrail
TA0005 · Defense EvasionT1562.008 · Disable or Modify Cloud Logs
vitaliy0x1Tue Jan 21cloud
Detectionmediumtest

AWS Console GetSigninToken Potential Abuse

Detects potentially suspicious events involving "GetSigninToken". An adversary using the "aws_consoler" tool can leverage this console API to create temporary federated credential that help obfuscate which AWS credential is compromised (the original access key) and enables the adversary to pivot from the AWS CLI to console sessions without the need for MFA using the new access key issued in this request.

AWScloudtrail
TA0008 · Lateral MovementTA0005 · Defense EvasionT1021.007 · Cloud ServicesT1550.001 · Application Access Token
Chester Le BronMon Feb 26cloud
Detectionmediumtest

SES Identity Has Been Deleted

Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities

AWScloudtrail
TA0005 · Defense EvasionT1070 · Indicator Removal
Janantha MarasingheTue Dec 13cloud
Detectionmediumtest

AWS S3 Bucket Versioning Disable

Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.

AWScloudtrail
TA0040 · ImpactT1490 · Inhibit System Recovery
Sean Johnstone | Unit 42Sat Oct 28cloud
Detectionhightest

AWS EC2 Startup Shell Script Change

Detects changes to the EC2 instance startup script. The shell script will be executed as root/SYSTEM every time the specific instances are booted up.

AWScloudtrail
TA0002 · ExecutionT1059.001 · PowerShellT1059.003 · Windows Command ShellT1059.004 · Unix Shell
falokerWed Feb 12cloud
Detectionlowtest

AWS EC2 VM Export Failure

An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.

AWScloudtrail
TA0009 · CollectionT1005 · Data from Local SystemTA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Diogo BrazThu Apr 16cloud
Detectionmediumtest

AWS ECS Task Definition That Queries The Credential Endpoint

Detects when an Elastic Container Service (ECS) Task Definition includes a command to query the credential endpoint. This can indicate a potential adversary adding a backdoor to establish persistence or escalate privileges.

AWScloudtrail
TA0003 · PersistenceT1525 · Implant Internal Image
Darin SmithTue Jun 07cloud
Detectionmediumtest

AWS EFS Fileshare Modified or Deleted

Detects when a EFS Fileshare is modified or deleted. You can't delete a file system that is in use. If the file system has any mount targets, the adversary must first delete them, so deletion of a mount will occur before deletion of a fileshare.

AWScloudtrail
TA0040 · Impact
Austin SongerSun Aug 15cloud
Detectionmediumtest

AWS EFS Fileshare Mount Modified or Deleted

Detects when a EFS Fileshare Mount is modified or deleted. An adversary breaking any file system using the mount target that is being deleted, which might disrupt instances or applications using those mounts.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerSun Aug 15cloud
Detectionlowtest

AWS EKS Cluster Created or Deleted

Identifies when an EKS cluster is created or deleted.

AWScloudtrail
TA0040 · ImpactT1485 · Data Destruction
Austin SongerMon Aug 16cloud
Detectionlowtest

AWS ElastiCache Security Group Created

Detects when an ElastiCache security group has been created.

AWScloudtrail
TA0003 · PersistenceT1136 · Create AccountT1136.003 · Cloud Account
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS ElastiCache Security Group Modified or Deleted

Identifies when an ElastiCache security group has been modified or deleted.

AWScloudtrail
TA0040 · ImpactT1531 · Account Access Removal
Austin SongerSat Jul 24cloud
Detectionlowtest

Potential Bucket Enumeration on AWS

Looks for potential enumeration of AWS buckets via ListBuckets.

AWScloudtrail
TA0007 · DiscoveryT1580 · Cloud Infrastructure DiscoveryT1619 · Cloud Storage Object Discovery
Christopher Peacock+1Fri Jan 06cloud
Detectionhightest

AWS GuardDuty Important Change

Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.

AWScloudtrail
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
falokerTue Feb 11cloud
Detectionmediumtest

AWS IAM Backdoor Users Keys

Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
falokerWed Feb 12cloud
Detectionhightest

AWS IAM S3Browser LoginProfile Creation

Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.

AWScloudtrail
TA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser Templated S3 Bucket Policy Creation

Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "<YOUR-BUCKET-NAME>".

AWScloudtrail
TA0002 · ExecutionT1059.009 · Cloud APITA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionhightest

AWS IAM S3Browser User or AccessKey Creation

Detects S3 Browser utility creating IAM User or AccessKey.

AWScloudtrail
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+3
daniel.bohannonWed May 17cloud
Detectionlowtest

AWS New Lambda Layer Attached

Detects when a user attached a Lambda layer to an existing Lambda function. A malicious Lambda layer could execute arbitrary code in the context of the function's IAM role. This would give an adversary access to resources that the function has access to.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerThu Sep 23cloud
Detectionlowtest

AWS Glue Development Endpoint Activity

Detects possible suspicious glue development endpoint activity.

AWScloudtrail
TA0004 · Privilege Escalation
Austin SongerSun Oct 03cloud
Detectionmediumtest

AWS RDS Master Password Change

Detects the change of database master password. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionhightest

Restore Public AWS RDS Instance

Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionmediumtest

AWS Root Credentials

Detects AWS root account usage

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+1
vitaliy0x1Tue Jan 21cloud
Detectionlowtest

AWS Route 53 Domain Transfer Lock Disabled

Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationTA0006 · Credential AccessT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS Route 53 Domain Transferred to Another Account

Detects when a request has been made to transfer a Route 53 domain to another AWS account.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0004 · Privilege EscalationT1098 · Account Manipulation
Elastic Security+1Thu Jul 22cloud
Detectionlowtest

AWS S3 Data Management Tampering

Detects when a user tampers with S3 data management in Amazon Web Services.

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerSat Jul 24cloud
Detectionmediumtest

AWS Snapshot Backup Exfiltration

Detects the modification of an EC2 snapshot's permissions to enable access from another account

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Darin SmithMon May 17cloud
Detectionhightest

AWS Identity Center Identity Provider Change

Detects a change in the AWS Identity Center (FKA AWS SSO) identity provider. A change in identity provider allows an attacker to establish persistent access or escalate privileges via user impersonation.

AWScloudtrail
TA0003 · PersistenceTA0006 · Credential AccessTA0005 · Defense EvasionT1556 · Modify Authentication Process
Michael McIntyreWed Sep 27cloud
Detectionlowtest

AWS STS AssumeRole Misuse

Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionlowtest

AWS STS GetSessionToken Misuse

Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.

AWScloudtrail
TA0008 · Lateral MovementTA0004 · Privilege EscalationTA0005 · Defense EvasionT1548 · Abuse Elevation Control Mechanism+2
Austin SongerSat Jul 24cloud
Detectionmediumtest

AWS Suspicious SAML Activity

Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.

AWScloudtrail
TA0005 · Defense EvasionTA0001 · Initial AccessTA0008 · Lateral MovementTA0003 · Persistence+5
Austin SongerWed Sep 22cloud
Detectionhightest

AWS User Login Profile Was Modified

Detects activity when someone is changing passwords on behalf of other users. An attacker with the "iam:UpdateLoginProfile" permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.

AWScloudtrail
TA0003 · PersistenceTA0004 · Privilege EscalationT1098 · Account Manipulation
toffeebr33kMon Aug 09cloud
Detectionmediumtest

Azure Active Directory Hybrid Health AD FS New Server

This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service. A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server. This can be done programmatically via HTTP requests to Azure.

Azureactivitylogs
TA0005 · Defense EvasionT1578 · Modify Cloud Compute Infrastructure
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26cloud
Detectionmediumtest

Azure Active Directory Hybrid Health AD FS Service Delete

This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant. A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs. The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.

Azureactivitylogs
TA0005 · Defense EvasionT1578.003 · Delete Cloud Instance
Roberto Rodriguez (Cyb3rWard0g)+2Thu Aug 26cloud
Detectionmediumtest

User Added to an Administrator's Azure AD Role

User Added to an Administrator's Azure AD Role

Azureactivitylogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+2
Raphaël CALVETMon Oct 04cloud
Detectionmediumtest

Azure Application Deleted

Identifies when a application is deleted in Azure.

Azureactivitylogs
TA0005 · Defense EvasionTA0040 · ImpactT1489 · Service Stop
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure Application Gateway Modified or Deleted

Identifies when a application gateway is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionmediumtest

Azure Application Security Group Modified or Deleted

Identifies when a application security group is modified or deleted.

Azureactivitylogs
TA0040 · Impact
Austin SongerMon Aug 16cloud
Detectionlowtest

Azure Container Registry Created or Deleted

Detects when a Container Registry is created or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1496 · Resource HijackingT1489 · Service Stop
Austin SongerSat Aug 07cloud
Detectionmediumtest

Number Of Resource Creation Or Deployment Activities

Number of VM creations or deployment activities occur in Azure via the azureactivity log.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098 · Account Manipulation
sawwinnnaungThu May 07cloud
Detectionmediumtest

Azure Device No Longer Managed or Compliant

Identifies when a device in azure is no longer managed or compliant

Azureactivitylogs
TA0040 · Impact
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure Device or Configuration Modified or Deleted

Identifies when a device or device configuration in azure is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1485 · Data DestructionT1565.001 · Stored Data Manipulation
Austin SongerFri Sep 03cloud
Detectionmediumtest

Azure DNS Zone Modified or Deleted

Identifies when DNS zone is modified or deleted.

Azureactivitylogs
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Firewall Modified or Deleted

Identifies when a firewall is created, modified, or deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerSun Aug 08cloud
Detectionmediumtest

Azure Firewall Rule Collection Modified or Deleted

Identifies when Rule Collections (Application, NAT, and Network) is being modified or deleted.

Azureactivitylogs
TA0040 · ImpactTA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Austin SongerSun Aug 08cloud
Detectionmediumtest

Granting Of Permissions To An Account

Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.

Azureactivitylogs
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.003 · Additional Cloud Roles
sawwinnnaungThu May 07cloud