Skip to content

new: AWS CloudTrail General Discovery and Reconnaissance API Calls#5929

Closed
uniqu3-us3r wants to merge 2 commits into
SigmaHQ:masterfrom
uniqu3-us3r:add-aws-cloudtrail-discovery-rule
Closed

new: AWS CloudTrail General Discovery and Reconnaissance API Calls#5929
uniqu3-us3r wants to merge 2 commits into
SigmaHQ:masterfrom
uniqu3-us3r:add-aws-cloudtrail-discovery-rule

Conversation

@uniqu3-us3r
Copy link
Copy Markdown
Contributor

@uniqu3-us3r uniqu3-us3r commented Apr 1, 2026

Summary of the Pull Request

Adds a new experimental detection rule for AWS CloudTrail discovery and reconnaissance activity. Detects a high volume of enumeration API calls across storage, networking, compute, and database services from a single user within a 5 minute window, which can be indicative of post-compromise reconnaissance via compromised credentials or privilege escalation.

Changelog

new: AWS CloudTrail General Discovery and Reconnaissance API Calls

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions Bot added Rules Review Needed The PR requires review labels Apr 1, 2026
@uniqu3-us3r uniqu3-us3r changed the title New rule: AWS CloudTrail General Discovery and Reconnaissance API Calls new: AWS CloudTrail General Discovery and Reconnaissance API Calls Apr 2, 2026
@nasbench
Copy link
Copy Markdown
Member

This is using the old correlation notation and moreover correlations are not yet accepted in this repo. I will include it when support is added in #5759

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants