590cc9cbbd
Rule is executing as expected, however it is alerting on failed requests. Low alert telemetry. This tuning: - removed markdown and edited description to be more specific - reduced execution window for 1 min lookback - name change to add `AWS` consistent with all other rules - added references that reflect in the wild threats and persistence usage - increased risk_score and severity to medium accounting for usage as persistence mechanism in the wild - added Persistence tag and Mitre tactic, technique, subtechnique - added `event.outcome: success` criteria to query - edited investigation guide to be more accurate reflection of steps required for investigating alert, including appropriate response action - added highlighted fields ** Note: only IAMUser and Root user identities can call this actions so we can use `aws.cloudtrail.user_identity.arn` as the new terms field without worrying about Role vs Role + Session issue seen with other new_terms rules