Try in Splunk Security Cloud


Identify unusual changes to your AWS EC2 instances that may indicate malicious activity. Modifications to your EC2 instances by previously unseen users is an example of an activity that may warrant further investigation.

  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
  • Datamodel:
  • Last Updated: 2018-04-09
  • Author: David Dorsey, Splunk
  • ID: 73de57ef-0dfc-411f-b1e7-fa24428aeae0


A common attack technique is to infiltrate a cloud instance and make modifications. The adversary can then secure access to your infrastructure or hide their activities. So it’s important to stay alert to changes that may indicate that your environment has been compromised.
Searches within this Analytic Story can help you detect the presence of a threat by monitoring for EC2 instances that have been created or changed–either by users that have never previously performed these activities or by known users who modify or create instances in a way that have not been done before. This story also provides investigative searches that help you go deeper once you detect suspicious behavior.


Name Technique Type
EC2 Instance Modified With Previously Unseen User Cloud Accounts Anomaly


source | version: 1