Analytics Story: Suspicious Cloud User Activities
Description
Detect and investigate suspicious activities by users and roles in your cloud environments.
Why it matters
It seems obvious that it is critical to monitor and control the users who have access to your cloud infrastructure. Nevertheless, it's all too common for enterprises to lose track of ad-hoc accounts, leaving their servers vulnerable to attack. In fact, this was the very oversight that led to Tesla's cryptojacking attack in February, 2018. In addition to compromising the security of your data, when bad actors leverage your compute resources, it can incur monumental costs, since you will be billed for any new instances and increased bandwidth usage.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
AWS CloudTrail | AWS | aws:cloudtrail |
aws_cloudtrail |
References
- https://d0.awsstatic.com/whitepapers/aws-security-best-practices.pdf
- https://redlock.io/blog/cryptojacking-tesla
Source: GitHub | Version: 1