Rules Contributing to Suspicious AWS SSL Certificate Activity Alert
The following rules are used to identify suspicious activity with AWS SSL certificate. Any one or more of these will trigger a Suspicious AWS SSL Certificate Alert. Details for each rule can be viewed by clicking the More Details link in the description.
| Title | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Update SSL Certificate Created | A new SSL certificate has been created in your environment. More details   Rule IDQuery{'selection1': {'eventSource': 'iam.amazonaws.com'}, 'selection2': {'eventName': 'UploadServerCertificate'}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber AWS configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
    N/A
 Severity50 Suppression Logic Based On
 Additional Information
 | ||||||||
| Update SSL Certificate Deleted | A certificate used for establishing SSL connection in your environment has been deleted. More details   Rule IDQuery{'selection1': {'eventSource': 'iam.amazonaws.com'}, 'selection2': {'eventName': 'DeleteServerCertificate'}, 'condition': 'selection1 and selection2'} Log SourceStellar Cyber AWS configured. Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
    N/A
 Severity50 Suppression Logic Based On
 Additional Information
 | 
