Rules Contributing to Suspicious AWS SSL Certificate Activity Alert
The following rules are used to identify suspicious activity with AWS SSL certificate. Any one or more of these will trigger a Suspicious AWS SSL Certificate Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
Update SSL Certificate Created |
A new SSL certificate has been created in your environment. More details
Rule IDQuery{'selection1': {'eventSource': 'iam.amazonaws.com'}, 'selection2': {'eventName': 'UploadServerCertificate'}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber AWS configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|
||||||||
Update SSL Certificate Deleted |
A certificate used for establishing SSL connection in your environment has been deleted. More details
Rule IDQuery{'selection1': {'eventSource': 'iam.amazonaws.com'}, 'selection2': {'eventName': 'DeleteServerCertificate'}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber AWS configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|