-
Notifications
You must be signed in to change notification settings - Fork 512
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Rule] AWS EC2 AMI Shared with Another Account #3600
Merged
terrancedejesus
merged 10 commits into
main
from
new-rule-ec2-ami-shared-with-separate-account.toml
May 14, 2024
Merged
[New Rule] AWS EC2 AMI Shared with Another Account #3600
terrancedejesus
merged 10 commits into
main
from
new-rule-ec2-ami-shared-with-separate-account.toml
May 14, 2024
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
terrancedejesus
added
Integration: AWS
AWS related rules
Domain: Cloud
Rule: New
Proposal for new rule
Area: RAD
labels
Apr 16, 2024
terrancedejesus
requested review from
w0rk3r,
DefSecSentinel,
imays11,
Samirbous and
Aegrah
May 6, 2024 14:05
imays11
approved these changes
May 10, 2024
Aegrah
approved these changes
May 13, 2024
rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml
Outdated
Show resolved
Hide resolved
…te_account.toml Co-authored-by: Ruben Groenewoud <[email protected]>
terrancedejesus
deleted the
new-rule-ec2-ami-shared-with-separate-account.toml
branch
May 14, 2024 05:56
protectionsmachine
pushed a commit
that referenced
this pull request
May 14, 2024
* new rule 'AWS EC2 AMI Shared with Another Account' * linted; updated UUID * added investigation guide * updated description * fixed spelling errors * Update rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml Co-authored-by: Ruben Groenewoud <[email protected]> * fixed spacing issue --------- Co-authored-by: Ruben Groenewoud <[email protected]> (cherry picked from commit d505b95)
protectionsmachine
pushed a commit
that referenced
this pull request
May 14, 2024
* new rule 'AWS EC2 AMI Shared with Another Account' * linted; updated UUID * added investigation guide * updated description * fixed spelling errors * Update rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml Co-authored-by: Ruben Groenewoud <[email protected]> * fixed spacing issue --------- Co-authored-by: Ruben Groenewoud <[email protected]> (cherry picked from commit d505b95)
protectionsmachine
pushed a commit
that referenced
this pull request
May 14, 2024
* new rule 'AWS EC2 AMI Shared with Another Account' * linted; updated UUID * added investigation guide * updated description * fixed spelling errors * Update rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml Co-authored-by: Ruben Groenewoud <[email protected]> * fixed spacing issue --------- Co-authored-by: Ruben Groenewoud <[email protected]> (cherry picked from commit d505b95)
protectionsmachine
pushed a commit
that referenced
this pull request
May 14, 2024
* new rule 'AWS EC2 AMI Shared with Another Account' * linted; updated UUID * added investigation guide * updated description * fixed spelling errors * Update rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml Co-authored-by: Ruben Groenewoud <[email protected]> * fixed spacing issue --------- Co-authored-by: Ruben Groenewoud <[email protected]> (cherry picked from commit d505b95)
protectionsmachine
pushed a commit
that referenced
this pull request
May 14, 2024
* new rule 'AWS EC2 AMI Shared with Another Account' * linted; updated UUID * added investigation guide * updated description * fixed spelling errors * Update rules/integrations/aws/exfiltration_ec2_ami_shared_with_separate_account.toml Co-authored-by: Ruben Groenewoud <[email protected]> * fixed spacing issue --------- Co-authored-by: Ruben Groenewoud <[email protected]> (cherry picked from commit d505b95)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issues
Summary
Identifies an AWS Amazon Machine Image (AMI) being shared with another AWS account. Adversaries with access may share an AMI with an external AWS account as a means of data exfiltration. AMIs can contain secrets, bash histories, code
artifacts, and other sensitive data that adversaries may abuse if shared with unauthorized accounts. AMIs can be made
publicly available accidentally as well.
Unfortunately, we are not able to lookup the account shown in the request parameters for this which would indicate if it were external to the existing organization or not. This would be a follow-up investigation step into this alert or an exception the customer can add.
The request parameters are the focus on this as they are the only indication that a user is being given access to the AMI typically through the ARN ID specified.
Example Data