cscli scenarios install crowdsecurity/aws-cis-benchmark-unauthorized-call
Detect unauthorized AWS API calls based on cloudtrail logs (Section 3.1 of CIS AWS Foundation Benchmark 1.2.0 ).
1type: trigger2name: crowdsecurity/aws-cis-benchmark-unauthorized-call3description: "Detect AWS API unauthorized calls"4filter: |5 evt.Meta.log_type == 'aws-cloudtrail' &&6 (7 (evt.Unmarshaled.cloudtrail.errorCode != nil && evt.Unmarshaled.cloudtrail.errorCode matches ".*UnauthorizedOperation$") ||8 (evt.Unmarshaled.cloudtrail.errorCode != nil && evt.Unmarshaled.cloudtrail.errorCode matches "^AccessDenied.*")9 )10labels:11 confidence: 312 spoofable: 013 classification:14 - attack.T121215 behavior: "cloud:audit"16 label: "AWS API unauthorized calls"17 service: aws18 cti: false19 remediation: false20