e633c83b73
* [New Rule] AWS SSM Inventory Reconnaissance by Rare User This rule detects the first time a user or role accesses AWS Systems Manager (SSM) inventory APIs or runs the AWS-GatherSoftwareInventory job. SSM Inventory provides detailed information about managed EC2 instances including installed software, patch compliance, network configurations, and command execution history. Threat actors, including Scattered Spider (LUCR-3), have been observed leveraging these APIs to enumerate targets for lateral movement while blending in with legitimate AWS operations. The rule uses a New Terms approach on cloud.account.id and user.name to identify when users access these reconnaissance APIs for the first time. No existing rules specifically detect SSM inventory reconnaissance activity. This fills a gap in detecting cloud infrastructure discovery techniques used for target enumeration prior to lateral movement. | API | Purpose | |-----|---------| | `GetInventory` | Query inventory data (installed software, OS details) | | `GetInventorySchema` | Discover available inventory types | | `ListInventoryEntries` | Get specific instance inventory | | `DescribeInstancePatches` | Find patch compliance/vulnerabilities | | `ListCommands` | View SSM command execution history | | `CreateAssociation` | Trigger AWS-GatherSoftwareInventory job | * Apply suggestions from code review