-
Notifications
You must be signed in to change notification settings - Fork 587
Open
Labels
Integration: AWSAWS related rulesAWS related rulesRule: NewProposal for new ruleProposal for new rulebacklogv7.14.07.14 rules release package7.14 rules release package
Description
Description
If an EC2 AMI is made public, an attacker can copy the AMI into their own account and launch an EC2 instance using that AMI and browse the contents of the disk, potentially revealing sensitive or otherwise non-public information.
Required Info
Target indexes
filebeat-*
logs-aws*
Platforms
aws
Tested ECS Version
tbd
Optional Info
Query
event.dataset:aws.cloudtrail and event.provider:ec2.amazonaws.com and event.action:ModifyImageAttribute and aws.cloudtrail.request_parameters:*attributeType=launchPermission* and event.outcome:success
References
https://endgame.readthedocs.io/en/latest/risks/amis/
Example Data
todo
kmcquade
Metadata
Metadata
Assignees
Labels
Integration: AWSAWS related rulesAWS related rulesRule: NewProposal for new ruleProposal for new rulebacklogv7.14.07.14 rules release package7.14 rules release package