Finding Specific Actions in CloudTrail

0

Hi, all, New to the community so will do my best to follow the dos and don't but a bit of a AWS novice so bear with me. It was noticed that the new "Malware Protection" trial had started in our AWS environment. However, nobody knows who did it, whether it was set up to continue after, etc. I went to CloudTrail to try and search for any indicators and all I can see is where folks have looked at the service page, but not necessarily enabled the service or activated the trial. Does anyone know of the correct attributes/parameters to use to determine this? Thank you!

已提问 1 年前289 查看次数
1 回答
1

Hi and welcome to the community!

You can search for the updateDetector event name to find who updated the Guard Duty configuration.

Enter image description here

In particular you should search to see if scanEc2InstanceWithFindings is set to true.

    "requestParameters": {
        "detectorId": "56bf249c0b2004c6e5f32f00b3cfda80",
        "enable": true,
        "findingPublishingFrequency": "SIX_HOURS",
        "dataSources": {
            "malwareProtection": {
                "scanEc2InstanceWithFindings": {
                    "ebsVolumes": true
                }
            }
        }
    },
AWS
已回答 1 年前
  • Thanks. I followed your guidance and it isn't showing me any events. I know we have logging enabled as a user search shows events. Does logging need to be enabled separately for the config changes?

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则

相关内容