Compute activity in dormant cloud region

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2026-03-15
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires one of the following data sources:
    • AWS Audit Log
      OR
    • Azure Audit Log
      OR
    • Gcp Audit Log

Detection Modules

Cloud

Detector Tags

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Unused/Unsupported Cloud Regions (T1535)

Severity

Informational

Description

A compute resource was created or updated in a cloud region that has been dormant for this project.

Attacker's Goals

Create compute resources in unmonitored regions to evade detection for purposes such as hijacking resources or establishing persistence.

Investigative actions

  • Verify if compute resources are authorized in this region.
  • Terminate unauthorized compute resources and disable unused regions.

Variations

Compute activity in dormant cloud region from a non-VPN IP address

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Unused/Unsupported Cloud Regions (T1535)

Severity

Informational

Description

A compute resource was created or updated in a cloud region that has been dormant for this project.

Attacker's Goals

Create compute resources in unmonitored regions to evade detection for purposes such as hijacking resources or establishing persistence.

Investigative actions

  • Verify if compute resources are authorized in this region.
  • Terminate unauthorized compute resources and disable unused regions.


A cloud compute instance was created in a dormant region

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Unused/Unsupported Cloud Regions (T1535)

Severity

Medium

Description

A compute resource was created or updated in a cloud region that has been dormant for this project.

Attacker's Goals

Create compute resources in unmonitored regions to evade detection for purposes such as hijacking resources or establishing persistence.

Investigative actions

  • Verify if compute resources are authorized in this region.
  • Terminate unauthorized compute resources and disable unused regions.


Compute activity in dormant cloud region by a compromised AWS access key

Synopsis

ATT&CK Tactic

Defense Evasion (TA0005)

ATT&CK Technique

Unused/Unsupported Cloud Regions (T1535)

Severity

High

Description

A compute resource was created or updated in a cloud region that has been dormant for this project.

Attacker's Goals

Create compute resources in unmonitored regions to evade detection for purposes such as hijacking resources or establishing persistence.

Investigative actions

  • Verify if compute resources are authorized in this region.
  • Terminate unauthorized compute resources and disable unused regions.