A cloud snapshot of AWS database or storage was modified or shared

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2025-06-24
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • AWS Audit Log

Detection Modules

Cloud

Detector Tags

Cloud Data Asset Disaster Recovery Risks, Cloud Data Asset Configuration

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Transfer Data to Cloud Account (T1537)

Severity

Informational

Description

A cloud identity has shared a snapshot of an AWS database or storage instance.

Attacker's Goals

Exfiltrate sensitive data that resides on the snapshot.

Investigative actions

  • Check if the identity intended to modify the snapshot.
  • Check if the identity performed additional malicious operations within the cloud environment.

Variations

Cloud snapshot of a database or storage instance was shared public

Synopsis

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Transfer Data to Cloud Account (T1537)

Severity

Low

Description

A cloud identity has shared a snapshot of an AWS database or storage instance.

Attacker's Goals

Exfiltrate sensitive data that resides on the snapshot.

Investigative actions

  • Check if the identity intended to modify the snapshot.
  • Check if the identity performed additional malicious operations within the cloud environment.
  • Check if snapshot contained sensitive information and investigate aws account that shared it.


Cloud snapshot of a database or storage instance was shared with an unknown AWS account

Synopsis

ATT&CK Tactic

Exfiltration (TA0010)

ATT&CK Technique

Transfer Data to Cloud Account (T1537)

Severity

Low

Description

A cloud identity has shared a snapshot of an AWS database or storage instance.

Attacker's Goals

Exfiltrate sensitive data that resides on the snapshot.

Investigative actions

  • Check if the identity intended to modify the snapshot.
  • Check if the identity performed additional malicious operations within the cloud environment.
  • Check which AWS accounts the snapshot was shared with.