Files
blue-team-tools/rules/cloud/aws/cloudtrail/aws_ec2_disable_encryption.yml
T

28 lines
882 B
YAML
Raw Normal View History

2021-06-29 11:06:00 +07:00
title: AWS EC2 Disable EBS Encryption
id: 16124c2d-e40b-4fcc-8f2c-5ab7870a2223
status: stable
2022-10-25 07:34:10 +02:00
description: |
Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region.
Disabling default encryption does not change the encryption status of your existing volumes.
references:
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisableEbsEncryptionByDefault.html
2021-06-29 11:06:00 +07:00
author: Sittikorn S
date: 2021-06-29
modified: 2021-08-20
2021-06-29 11:06:00 +07:00
tags:
- attack.impact
- attack.t1486
- attack.t1565
logsource:
2021-11-14 09:56:59 +01:00
product: aws
2021-06-29 11:06:00 +07:00
service: cloudtrail
detection:
selection:
eventSource: ec2.amazonaws.com
2021-08-09 15:41:40 +02:00
eventName: DisableEbsEncryptionByDefault
2021-06-29 11:06:00 +07:00
condition: selection
falsepositives:
- System Administrator Activities
- DEV, UAT, SAT environment. You should apply this rule with PROD account only.
2021-06-29 18:05:25 +07:00
level: medium