Cloud infrastructure enumeration activity

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

10 Minutes

Deduplication Period

5 Days

Required Data

  • Requires one of the following data sources:
    • AWS Audit Log
      OR
    • Gcp Audit Log

Detection Modules

Cloud

Detector Tags

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Informational

Description

A cloud identity attempted to discover available resources within the cloud environment.
This may indicate an adversary attempting to map the organization's cloud environment and discover cloud resources that may assist to perform additional attacks within the environment.

Attacker's Goals

Map the cloud environment and detect potential resources to abuse.

Investigative actions

  • Check the identity's role designation in the organization.
  • Identify which available resources were discovered.
  • Investigate if the discovered resources were used to extract sensitive information or perform other attacks in the cloud environment.

Variations

Suspicious cloud infrastructure enumeration activity

Synopsis

ATT&CK Tactic

Discovery (TA0007)

ATT&CK Technique

Severity

Low

Description

A cloud identity attempted to discover available resources within the cloud environment.
This may indicate an adversary attempting to map the organization's cloud environment and discover cloud resources that may assist to perform additional attacks within the environment.

Attacker's Goals

Map the cloud environment and detect potential resources to abuse.

Investigative actions

  • Check the identity's role designation in the organization.
  • Identify which available resources were discovered.
  • Investigate if the discovered resources were used to extract sensitive information or perform other attacks in the cloud environment.