EXPLORE
← Back to Explore
sigmalowHunting

AWS ElastiCache Security Group Created

Detects when an ElastiCache security group has been created.

MITRE ATT&CK

persistence

Detection Query

selection:
  eventSource: elasticache.amazonaws.com
  eventName: CreateCacheSecurityGroup
condition: selection

Author

Austin Songer @austinsonger

Created

2021-07-24

Data Sources

awscloudtrail

Platforms

aws

Tags

attack.persistenceattack.t1136attack.t1136.003
Raw Content
title: AWS ElastiCache Security Group Created
id: 4ae68615-866f-4304-b24b-ba048dfa5ca7
status: test
description: Detects when an ElastiCache security group has been created.
references:
    - https://github.com/elastic/detection-rules/blob/598f3d7e0a63221c0703ad9a0ea7e22e7bc5961e/rules/integrations/aws/persistence_elasticache_security_group_creation.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
    - attack.persistence
    - attack.t1136
    - attack.t1136.003
logsource:
    product: aws
    service: cloudtrail
detection:
    selection:
        eventSource: elasticache.amazonaws.com
        eventName: 'CreateCacheSecurityGroup'
    condition: selection
falsepositives:
    - A ElastiCache security group may be created by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Security group creations from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.


level: low