Security group open to the world

cloudtrail

Classification:

attack

Tactic:

Technique:

Framework:

cis

Control:

cis-3.10

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when an AWS security group is opened to the world.

Strategy

Monitor CloudTrail and detect when an AWS security group has been created or modified with one of the following API calls:

This rule inspects the @requestParameters.ipPermissions.items.ipRanges.items.cidrIp array to determine if either of the strings are contained:

  • 0.0.0.0/0
  • ::/0

Triage and response

  1. Determine who the user was who made this API call.
  2. Contact the user and see if this was an API call which was made by the user.
  3. If the API call was not made by the user:
  • Rotate the user credentials and investigate what other API calls.
  • Determine what other API calls the user made which were not made by the user.

Changelog

18 March 2022 - Updated rule query.

PREVIEWING: brett0000FF/node-compatibility